Markov Ciphers and Differential Cryptanalysis
From MaRDI portal
Publication:4037447
DOI10.1007/3-540-46416-6_2zbMATH Open0777.94013OpenAlexW1978695162MaRDI QIDQ4037447FDOQ4037447
Authors: Xuejia Lai, James L. Massey
Publication date: 18 May 1993
Published in: Advances in Cryptology — EUROCRYPT ’91 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-46416-6_2
Recommendations
differential cryptanalysischosen-plaintext attackMarkov ciphersProposed Encryption Standardsecret-key cipherssecurity of iterated block ciphers
Cited In (only showing first 100 items - show all)
- Title not available (Why is that?)
- Automatic tool for searching for differential characteristics in ARX ciphers and applications
- Subgroups of direct products of groups invariant under the action of permutations on factors
- A geometric approach to linear cryptanalysis
- The block cipher \textsc{Square}
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- Post-quantum security on the Lai-Massey scheme
- Differential cryptanalysis of round-reduced \texttt{SPEEDY} family
- Strong and tight security guarantees against integral distinguishers
- Can a differential attack work for an arbitrarily large number of rounds?
- Quantum-chaotic key distribution in optical networks: from secrecy to implementation with logistic map
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- What is the effective key length for a block cipher: an attack on every practical block cipher
- The Delicate Issues of Addition with Respect to XOR Differences
- Higher order differentiation over finite fields with applications to generalising the cube attack
- Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Capacity and data complexity in multidimensional linear attack
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- Side channel cryptanalysis of product ciphers
- Title not available (Why is that?)
- Bug Attacks
- A note on APN permutations in even dimension
- Packed ciphertexts in LWE-based homomorphic encryption
- Differential-linear cryptanalysis revisited
- On some block ciphers and imprimitive groups
- New attacks on IDEA with at least 6 rounds
- Linear Cryptanalysis of Non Binary Ciphers
- New types of cryptanalytic attacks using related keys
- Fault Analysis Study of IDEA
- The \(t\)-wise independence of substitution-permutation networks
- Title not available (Why is that?)
- A Unified Approach to Related-Key Attacks
- A bit-vector differential model for the modular addition by a constant
- Differential cryptanalysis of Lucifer
- Analysis of mixing properties of the operations of modular addition and bitwise addition defined on one carrier
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Bug attacks
- Security of the Poseidon hash function against non-binary differential and linear attacks
- Title not available (Why is that?)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations
- JEROBOAM
- New criteria for linear maps in AES-like ciphers
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- Distinguishing distributions using Chernoff information
- Multiple differential cryptanalysis: theory and practice
- Rotational cryptanalysis on MAC algorithm chaskey
- Improved top-down techniques in differential cryptanalysis
- Improved differential attack on round-reduced LEA
- Title not available (Why is that?)
- Provable security against a differential attack
- A methodology for differential-linear cryptanalysis and its applications
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network
- Best differential characteristic search of FEAL
- Cryptanalysis of \textsc{Widea}
- Differential cryptanalysis in the fixed-key model
- Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy
- Automatic search for the best trails in ARX: application to block cipher \textsc{Speck}
- On the design and security of RC2
- The phantom of differential characteristics
- Group theoretic properties of Rijndael-like ciphers
- Applications of SAT solvers in cryptanalysis: finding weak keys and preimages
- Generic attacks on the Lai-Massey scheme
- Distinguishing attacks on block ciphers by differentials of two-block texts
- On design and analysis of a new block cipher
- Improved differential attacks on RC5
- Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Improved attacks on \texttt{GIFT-64}
- Spectral criterion for testing hypotheses on random permutations
- Clustering effect in \textsc{Simon} and \textsc{Simeck}
- Yoyo attack on 4-round Lai-Massey scheme with secret round functions
- Security evaluation of MISTY structure with SPN round function
- Differential entropy analysis of the IDEA block cipher
- Clustering effect of iterative differential and linear trails
- Difference characteristics of random maps and their compositions
- On the constructions of Markov maps
- Rotational analysis of ChaCha permutation
- Transposition of AES key schedule
- On scatter properties of modular addition operation over imprimitivity systems of the translation group of the binary vector space
- Ciphertext-only attack on Akelarre
- Criteria for Markov block ciphers
- Partitions on bigrams and Markov property of block ciphers
- Permutation homomorphisms of block ciphers and \({\otimes_{\mathbf{W}}} \)-Markovian property
- \( \otimes_{\mathcal{W}} \)-Markovianity of XSL-block ciphers connected with properties of their round functions
- Probabilistic properties of statistical dependencies between input and output of Markovian iterative cipher with round transformations on abelian groups
- An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros
- Title not available (Why is that?)
- Key-recovery attacks on \texttt{CRAFT} and \texttt{WARP}
- Mixing properties of operations defined on the set of \(n\)-dimensional vectors over a prime finite field
- Parallel SAT framework to find clustering of differential characteristics and its applications
This page was built for publication: Markov Ciphers and Differential Cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4037447)