On the weak keys of blowfish
From MaRDI portal
Publication:4593779
DOI10.1007/3-540-60865-6_39zbMATH Open1373.94932DBLPconf/fse/Vaudenay96OpenAlexW1495580669WikidataQ21898105 ScholiaQ21898105MaRDI QIDQ4593779FDOQ4593779
Authors: Serge Vaudenay
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-60865-6_39
Recommendations
- A New Class of Weak Keys for Blowfish
- On the bit security of the weak Diffie-Hellman problem
- WEAK KEYS AND WEAK DATA FOILING THE TWO NEMESES
- On the bit security of the Diffie-Hellman key
- Revisiting Wiener’s Attack – New Weak Keys in RSA
- Weakness in a RSA-based password authenticated key exchange protocol
- Weak keys for AEZ, and the external key padding attack
- Weaknesses in some threshold cryptosystems
- New weak keys in RSA
Cited In (10)
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Slender-set differential cryptanalysis
- A New Class of Weak Keys for Blowfish
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- How many weak-keys exist in T-310?
- Ubiquitous weak-key classes of BRW-polynomial function
- Differential cryptanalysis of PRESENT-like cipher
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
- WEAK KEYS AND WEAK DATA FOILING THE TWO NEMESES
This page was built for publication: On the weak keys of blowfish
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4593779)