Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES

From MaRDI portal
Publication:3452355

DOI10.1007/3-540-68697-5_19zbMath1329.94066OpenAlexW1546907539WikidataQ56335890 ScholiaQ56335890MaRDI QIDQ3452355

John Kelsey, Bruce Schneier, David Wagner

Publication date: 11 November 2015

Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68697-5_19




Related Items (27)

SEA: A Scalable Encryption Algorithm for Small Embedded ApplicationsZero-correlation attacks: statistical models independent of the number of approximationsA bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysisOn the Notions of PRP-RKA, KR and KR-RKA for Block CiphersPractical-time related-key attack on GOST with secret S-boxesA single-key attack on the full GOST block cipherA bit-vector differential model for the modular addition by a constantA Unified Approach to Related-Key AttacksA (Second) Preimage Attack on the GOST Hash FunctionOn the Salsa20 Core FunctionTransposition of AES Key ScheduleA note on quantum related-key attacksCryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephonyA methodology for differential-linear cryptanalysis and its applicationsThe (related-key) impossible boomerang attack and its application to the AES block cipherCryptanalysis of the GOST Hash FunctionUnnamed ItemRevisiting key schedule's diffusion in relation with round function's diffusionThe Delicate Issues of Addition with Respect to XOR DifferencesАтака на шифрсистему ГОСТ 28147-89 с 12 связанными ключамиThe Tiny Encryption AlgorithmRelated-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the WeaknessesMeet-in-the-Middle Attacks on Reduced-Round XTEAUnnamed ItemReflection Cryptanalysis of Some CiphersNew attacks on IDEA with at least 6 rounds


Uses Software


Cites Work


This page was built for publication: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES