Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
From MaRDI portal
Publication:5458952
Recommendations
- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
- New Impossible Differential Cryptanalysis of Reduced-Round Camellia
- New impossible differential attacks on Camellia
- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
- New impossible differential attacks of reduced-round Camellia-192 and Camellia-256
Cites work
- scientific article; zbMATH DE number 2089127 (Why is no real title available?)
- scientific article; zbMATH DE number 2089129 (Why is no real title available?)
- scientific article; zbMATH DE number 2089131 (Why is no real title available?)
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- scientific article; zbMATH DE number 1808210 (Why is no real title available?)
- scientific article; zbMATH DE number 2080696 (Why is no real title available?)
- scientific article; zbMATH DE number 2081066 (Why is no real title available?)
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- scientific article; zbMATH DE number 1504667 (Why is no real title available?)
- scientific article; zbMATH DE number 1759641 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1418249 (Why is no real title available?)
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- New Observation on Camellia
- New block encryption algorithm MISTY
- On MISTY1 Higher Order Differential Cryptanalysis
Cited in
(20)- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
- Impossible differential cryptanalysis of 14-round Camellia-192
- Note on impossible differential attacks
- New Impossible Differential Cryptanalysis of Reduced-Round Camellia
- Improved Differential Cryptanalysis of CAST-128 and CAST-256
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- scientific article; zbMATH DE number 1759642 (Why is no real title available?)
- An Improved Impossible Differential Attack on MISTY1
- Security of the SMS4 block cipher against differential cryptanalysis
- Rectangle attacks on reduced versions of the FBC block cipher
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Impossible differential attack on reduced round SPARX-64/128
- Impossible differentials of SPN ciphers
- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
- Quantum impossible differential attacks: applications to AES and SKINNY
- Improved Impossible Differential Attacks on Large-Block Rijndael
- Improved attacks on reduced-round Camellia-128/192/256
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Weak rotational property and its application
This page was built for publication: Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458952)