Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
From MaRDI portal
Publication:3452355
DOI10.1007/3-540-68697-5_19zbMath1329.94066OpenAlexW1546907539WikidataQ56335890 ScholiaQ56335890MaRDI QIDQ3452355
John Kelsey, Bruce Schneier, David Wagner
Publication date: 11 November 2015
Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-68697-5_19
Related Items (27)
SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ Zero-correlation attacks: statistical models independent of the number of approximations ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers ⋮ Practical-time related-key attack on GOST with secret S-boxes ⋮ A single-key attack on the full GOST block cipher ⋮ A bit-vector differential model for the modular addition by a constant ⋮ A Unified Approach to Related-Key Attacks ⋮ A (Second) Preimage Attack on the GOST Hash Function ⋮ On the Salsa20 Core Function ⋮ Transposition of AES Key Schedule ⋮ A note on quantum related-key attacks ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Cryptanalysis of the GOST Hash Function ⋮ Unnamed Item ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion ⋮ The Delicate Issues of Addition with Respect to XOR Differences ⋮ Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами ⋮ The Tiny Encryption Algorithm ⋮ Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses ⋮ Meet-in-the-Middle Attacks on Reduced-Round XTEA ⋮ Unnamed Item ⋮ Reflection Cryptanalysis of Some Ciphers ⋮ New attacks on IDEA with at least 6 rounds
Uses Software
Cites Work
- Parallel collision search with cryptanalytic applications
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
- Markov Ciphers and Differential Cryptanalysis
- Fast Software Encryption Functions
- SAFER K-64: A byte-oriented block-ciphering algorithm
- A software-optimized encryption algorithm
- On the weak keys of blowfish
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES