Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES

From MaRDI portal
Publication:3452355


DOI10.1007/3-540-68697-5_19zbMath1329.94066WikidataQ56335890 ScholiaQ56335890MaRDI QIDQ3452355

John Kelsey, Bruce Schneier, David Wagner

Publication date: 11 November 2015

Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68697-5_19


94A60: Cryptography


Related Items

Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами, Unnamed Item, Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006, The Delicate Issues of Addition with Respect to XOR Differences, The Tiny Encryption Algorithm, Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses, Reflection Cryptanalysis of Some Ciphers, Practical-time related-key attack on GOST with secret S-boxes, A note on quantum related-key attacks, A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony, A methodology for differential-linear cryptanalysis and its applications, The (related-key) impossible boomerang attack and its application to the AES block cipher, Zero-correlation attacks: statistical models independent of the number of approximations, A single-key attack on the full GOST block cipher, A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis, New attacks on IDEA with at least 6 rounds, Revisiting key schedule's diffusion in relation with round function's diffusion, A bit-vector differential model for the modular addition by a constant, Transposition of AES Key Schedule, Unnamed Item, Meet-in-the-Middle Attacks on Reduced-Round XTEA, SEA: A Scalable Encryption Algorithm for Small Embedded Applications, On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers, A Unified Approach to Related-Key Attacks, A (Second) Preimage Attack on the GOST Hash Function, On the Salsa20 Core Function, Cryptanalysis of the GOST Hash Function


Uses Software


Cites Work