Differential Cryptanalysis of Feal and N-Hash
From MaRDI portal
Publication:4037445
Recommendations
Cited in
(17)- On CCZ-equivalence of addition mod \(2^n\)
- Substitution-permutation networks resistant to differential and linear cryptanalysis
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- The cryptanalysis of FEAL-4 with 20 chosen plaintexts
- Computing AES related-key differential characteristics with constraint programming
- scientific article; zbMATH DE number 1406794 (Why is no real title available?)
- Differential Properties of the HFE Cryptosystem
- And Rijndael? Automatic related-key differential analysis of Rijndael
- Differential cryptanalysis of Lucifer
- Linear and differential cryptanalysis of Russian GOST
- Best differential characteristic search of FEAL
- On properties of translation groups in the affine general linear group with applications to cryptography
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- One-way hash functions with changeable parameters.
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Distributed differential criptanalysis of FEAL-8
- Revisiting AES related-key differential attacks with constraint programming
This page was built for publication: Differential Cryptanalysis of Feal and N-Hash
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4037445)