Markov Ciphers and Differential Cryptanalysis
From MaRDI portal
Publication:4037447
Recommendations
Cited in
(only showing first 100 items - show all)- Analysis of mixing properties of the operations of modular addition and bitwise addition defined on one carrier
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- Linear Cryptanalysis of Non Binary Ciphers
- Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations
- The \(t\)-wise independence of substitution-permutation networks
- scientific article; zbMATH DE number 7310182 (Why is no real title available?)
- New criteria for linear maps in AES-like ciphers
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Security of the Poseidon hash function against non-binary differential and linear attacks
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Group theoretic properties of Rijndael-like ciphers
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- scientific article; zbMATH DE number 708833 (Why is no real title available?)
- A bit-vector differential model for the modular addition by a constant
- Can a differential attack work for an arbitrarily large number of rounds?
- Automatic tool for searching for differential characteristics in ARX ciphers and applications
- Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy
- Improved differential attack on round-reduced LEA
- A Unified Approach to Related-Key Attacks
- Subgroups of direct products of groups invariant under the action of permutations on factors
- New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network
- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- A geometric approach to linear cryptanalysis
- Differential-linear cryptanalysis revisited
- The block cipher \textsc{Square}
- Quantum-chaotic key distribution in optical networks: from secrecy to implementation with logistic map
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- On some block ciphers and imprimitive groups
- Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- scientific article; zbMATH DE number 1024497 (Why is no real title available?)
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- The phantom of differential characteristics
- Automatic search for the best trails in ARX: application to block cipher \textsc{Speck}
- JEROBOAM
- Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers
- Side channel cryptanalysis of product ciphers
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- New types of cryptanalytic attacks using related keys
- Bug Attacks
- Differential cryptanalysis of Lucifer
- Post-quantum security on the Lai-Massey scheme
- scientific article; zbMATH DE number 7593738 (Why is no real title available?)
- A note on APN permutations in even dimension
- Fault Analysis Study of IDEA
- Capacity and data complexity in multidimensional linear attack
- Best differential characteristic search of FEAL
- The Delicate Issues of Addition with Respect to XOR Differences
- New attacks on IDEA with at least 6 rounds
- Applications of SAT solvers in cryptanalysis: finding weak keys and preimages
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Differential cryptanalysis in the fixed-key model
- Bug attacks
- Distinguishing distributions using Chernoff information
- Multiple differential cryptanalysis: theory and practice
- Provable security against a differential attack
- Generic attacks on the Lai-Massey scheme
- A methodology for differential-linear cryptanalysis and its applications
- Packed ciphertexts in LWE-based homomorphic encryption
- Improved top-down techniques in differential cryptanalysis
- Higher order differentiation over finite fields with applications to generalising the cube attack
- On the design and security of RC2
- Cryptanalysis of \textsc{Widea}
- Rotational cryptanalysis on MAC algorithm chaskey
- Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
- Differential cryptanalysis of round-reduced \texttt{SPEEDY} family
- scientific article; zbMATH DE number 1394289 (Why is no real title available?)
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Strong and tight security guarantees against integral distinguishers
- Parallel SAT framework to find clustering of differential characteristics and its applications
- Yoyo attack on 4-round Lai-Massey scheme with secret round functions
- Improved differential attacks on RC5
- A CP-based automatic tool for instantiating truncated differential characteristics
- Differential entropy analysis of the IDEA block cipher
- scientific article; zbMATH DE number 7310284 (Why is no real title available?)
- Truncated differential cryptanalysis: new insights and application to \texttt{QARMAv1}-\(n\) and \texttt{QARMAv2}-64
- New approaches for estimating the bias of differential-linear distinguishers
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Wide Trail Design Strategy for Binary MixColumns
- Differential attacks against SPN: a thorough analysis
- Distinguishing attacks on block ciphers by differentials of two-block texts
- Ciphertext-only attack on Akelarre
- Distinguisher and related-key attack on HALFLOOP-96
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers
- Key-recovery attacks on \texttt{CRAFT} and \texttt{WARP}
- Revisiting key schedule's diffusion in relation with round function's diffusion
- An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros
- Clustering effect of iterative differential and linear trails
- Spectral criterion for testing hypotheses on random permutations
- Automated-based rebound attacks on ACE permutation
- Difference characteristics of random maps and their compositions
- On the constructions of Markov maps
- Экономные модели цепей Маркова высокого порядка для оценивания криптографических генераторов
- Неабелевость группы наложения ключа и свойство $\otimes _{\mathbf{W}}$-марковости алгоритмов блочного шифрования
- Transposition of AES key schedule
- Mixing properties of operations defined on the set of \(n\)-dimensional vectors over a prime finite field
This page was built for publication: Markov Ciphers and Differential Cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4037447)