Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
From MaRDI portal
Publication:5458952
DOI10.1007/978-3-540-79263-5_24zbMATH Open1153.94408OpenAlexW1868228027MaRDI QIDQ5458952FDOQ5458952
Authors: Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman
Publication date: 24 April 2008
Published in: Topics in Cryptology – CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-996.pdf
Recommendations
- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
- New Impossible Differential Cryptanalysis of Reduced-Round Camellia
- New impossible differential attacks on Camellia
- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
- New impossible differential attacks of reduced-round Camellia-192 and Camellia-256
Cites Work
- New block encryption algorithm MISTY
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- On MISTY1 Higher Order Differential Cryptanalysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- New Observation on Camellia
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (20)
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Improved attacks on reduced-round Camellia-128/192/256
- Impossible differential attack on reduced round SPARX-64/128
- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128
- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
- Note on impossible differential attacks
- Rectangle attacks on reduced versions of the FBC block cipher
- Impossible differential cryptanalysis of 14-round Camellia-192
- Impossible differentials of SPN ciphers
- New Impossible Differential Cryptanalysis of Reduced-Round Camellia
- Improved Differential Cryptanalysis of CAST-128 and CAST-256
- An Improved Impossible Differential Attack on MISTY1
- Improved Impossible Differential Attacks on Large-Block Rijndael
- Weak rotational property and its application
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Title not available (Why is that?)
- Security of the SMS4 block cipher against differential cryptanalysis
- Quantum impossible differential attacks: applications to AES and SKINNY
This page was built for publication: Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458952)