Algebraic Techniques in Differential Cryptanalysis
From MaRDI portal
Publication:3391571
DOI10.1007/978-3-642-03317-9_12zbMATH Open1291.94043OpenAlexW1534885379MaRDI QIDQ3391571FDOQ3391571
Authors: Martin R. Albrecht, Carlos Cid
Publication date: 11 August 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03317-9_12
Recommendations
- Algebraic techniques in differential cryptanalysis revisited
- Differential-linear cryptanalysis from an algebraic perspective
- Algebraic precomputations in differential and integral cryptanalysis
- Algebraic Cryptanalysis
- Algebraic cryptanalysis and new security enhancements
- Mathematical and computer algebra techniques in cryptology
- Algebraic Cryptanalysis of the Data Encryption Standard
- Advanced Encryption Standard – AES
- Publication:4940676
Cited In (22)
- On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
- Algebraic cryptanalysis of \textsf{Present} based on the method of syllogisms
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Algebraic-differential attacks on a family of arithmetization-oriented symmetric ciphers
- On the relation between the MXL family of algorithms and Gröbner basis algorithms
- Low data complexity differential-algebraic attack on reduced round DES
- Algebraic cryptanalysis of curry and flurry using correlated messages
- A new representation of S-boxes for algebraic differential cryptanalysis
- Improved practical attacks on round-reduced Keccak
- Algebraic precomputations in differential and integral cryptanalysis
- Obtaining and solving systems of equations in key variables only for the small variants of AES
- Multiple differential cryptanalysis: theory and practice
- Algebraic cryptanalysis of variants of \textsc{Frit}
- Algebraic side-channel attacks
- Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY
- From higher-order differentials to polytopic cryptyanalysis
- Title not available (Why is that?)
- Attacks on block ciphers of low algebraic degree
- Algebraic techniques in differential cryptanalysis revisited
- FPGA implementation of a statistical saturation attack against PRESENT
- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
- Title not available (Why is that?)
Uses Software
This page was built for publication: Algebraic Techniques in Differential Cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3391571)