The Wide Trail Design Strategy

From MaRDI portal
Publication:4550270


DOI10.1007/3-540-45325-3_20zbMath0998.94541MaRDI QIDQ4550270

Vincent Rijmen, Joan Daemen

Publication date: 25 November 2002

Published in: Cryptography and Coding (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-45325-3_20


94A60: Cryptography


Related Items

Analysis of the Kupyna-256 Hash Function, Impossible Differential Attack on Reduced Round SPARX-64/128, eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices, On the guaranteed number of activations in $\mathsf{XS}$-circuits, Block cipher invariants as eigenvectors of correlation matrices, On construction of lightweight MDS matrices, A geometric approach to linear cryptanalysis, Sequential indifferentiability of confusion-diffusion networks, Provable security of HADES structure, Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function, Improving the security and efficiency of block ciphers based on LS-designs, Provable security of block ciphers against linear cryptanalysis: a mission impossible?, Upper bound of the length of truncated impossible differentials for AES, Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis, Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-128, Nonlinear diffusion layers, Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers, The resistance of PRESENT-80 against related-key differential attacks, On a generalization of substitution-permutation networks: the HADES design strategy, Thinking outside the superbox, Counting active S-boxes is not enough, The rebound attack and subspace distinguishers: application to Whirlpool, Connecting tweakable and multi-key blockcipher security, Security evaluation of MISTY structure with SPN round function, Cryptanalysis of masked ciphers: a not so random idea, Analysis of NORX: Investigating Differential and Rotational Properties, Towards Understanding the Known-Key Security of Block Ciphers, ALE: AES-Based Lightweight Authenticated Encryption, Differential Attacks Against SPN: A Thorough Analysis, Simpira v2: A Family of Efficient Permutations Using the AES Round Function, Design Strategies for ARX with Provable Bounds: Sparx and LAX, SPF: A New Family of Efficient Format-Preserving Encryption Algorithms, On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis, Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function, SEA: A Scalable Encryption Algorithm for Small Embedded Applications, Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent, Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication, New Applications of Differential Bounds of the SDS Structure, Speeding up Collision Search for Byte-Oriented Hash Functions