Algebraic Techniques in Differential Cryptanalysis
From MaRDI portal
Publication:3391571
Recommendations
- Algebraic techniques in differential cryptanalysis revisited
- Differential-linear cryptanalysis from an algebraic perspective
- Algebraic precomputations in differential and integral cryptanalysis
- Algebraic Cryptanalysis
- Algebraic cryptanalysis and new security enhancements
- Mathematical and computer algebra techniques in cryptology
- Algebraic Cryptanalysis of the Data Encryption Standard
- Advanced Encryption Standard – AES
- Publication:4940676
Cited in
(22)- scientific article; zbMATH DE number 1982616 (Why is no real title available?)
- On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
- Algebraic cryptanalysis of \textsf{Present} based on the method of syllogisms
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Algebraic-differential attacks on a family of arithmetization-oriented symmetric ciphers
- On the relation between the MXL family of algorithms and Gröbner basis algorithms
- Low data complexity differential-algebraic attack on reduced round DES
- Algebraic cryptanalysis of curry and flurry using correlated messages
- A new representation of S-boxes for algebraic differential cryptanalysis
- Improved practical attacks on round-reduced Keccak
- Algebraic precomputations in differential and integral cryptanalysis
- Obtaining and solving systems of equations in key variables only for the small variants of AES
- Multiple differential cryptanalysis: theory and practice
- Algebraic cryptanalysis of variants of \textsc{Frit}
- Algebraic side-channel attacks
- Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY
- From higher-order differentials to polytopic cryptyanalysis
- scientific article; zbMATH DE number 3161573 (Why is no real title available?)
- Algebraic techniques in differential cryptanalysis revisited
- FPGA implementation of a statistical saturation attack against PRESENT
- Attacks on block ciphers of low algebraic degree
- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
This page was built for publication: Algebraic Techniques in Differential Cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3391571)