Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Analysis of bitsum attack on block ciphers

From MaRDI portal
Publication:5069833
Jump to:navigation, search

DOI10.1080/09720529.2016.1187960zbMATH Open1495.94041OpenAlexW2549668244MaRDI QIDQ5069833FDOQ5069833


Authors: Amandeep, G. Geetha Edit this on Wikidata


Publication date: 19 April 2022

Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1080/09720529.2016.1187960





zbMATH Keywords

cryptanalysisFEALTEAXTEAblowfishBitsum attack


Mathematics Subject Classification ID

Cryptography (94A60)


Cites Work

  • Title not available (Why is that?)
  • Communication Theory of Secrecy Systems*
  • Title not available (Why is that?)
  • A tutorial on linear and differential cryptanalysis
  • Fast Data Encipherment Algorithm FEAL
  • A multidimensional linear distinguishing attack on the Shannon cipher
  • A self-study course in block-cipher cryptanalysis
  • Some results on cryptanalysis of SMS4 block cipher


Cited In (2)

  • SPF-CA: a new cellular automata based block cipher using key-dependent S-boxes
  • Symmetric random function generator (SRFG): a novel cryptographic primitive for designing fast and robust algorithms

Uses Software

  • Blowfish
  • TEA
  • XTEA





This page was built for publication: Analysis of bitsum attack on block ciphers

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5069833)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:5069833&oldid=19558341"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 8 February 2024, at 12:00. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki