Differential cryptanalysis in the fixed-key model
From MaRDI portal
Publication:6163971
DOI10.1007/978-3-031-15982-4_23zbMATH Open1517.94064MaRDI QIDQ6163971FDOQ6163971
Authors: Tim Beyne, Vincent Rijmen
Publication date: 30 June 2023
Published in: Advances in Cryptology – CRYPTO 2022 (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/20.500.12942/709369
Recommendations
differential cryptanalysiscorrelation matrices\textsf{KNOT}\textsf{RECTANGLE}\textsf{Simon}\textsf{Speck}hypothesis of stochastic equivalence
Cites Work
- PRESENT: An Ultra-Lightweight Block Cipher
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Markov Ciphers and Differential Cryptanalysis
- Differential analysis of the LED block cipher
- How to Break MD5 and Other Hash Functions
- Finding SHA-1 Characteristics: General Results and Applications
- Linear Cryptanalysis of Reduced Round Serpent
- Differential cryptanalysis of round-reduced \textsc{Simon} and \textsc{Speck}
- Differential analysis of block ciphers \textsc{Simon} and \textsc{Speck}
- Improved Differential Cryptanalysis of Round-Reduced Speck
- Analysis of differential attacks in ARX constructions
- Block cipher invariants as eigenvectors of correlation matrices
- On CCZ-equivalence of addition mod \(2^n\)
- Title not available (Why is that?)
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- A geometric approach to linear cryptanalysis
- The phantom of differential characteristics
Cited In (19)
- Differential Cryptanalysis of the ICE Encryption Algorithm
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- On perfect linear approximations and differentials over two-round SPNs
- Impact of the Hamming weight of the difference of two random variables on the probability of its preservation after addition and subtraction
- Clustering effect of iterative differential and linear trails
- More insight on deep learning-aided cryptanalysis
- Differential Propagation Analysis of Keccak
- Differential Cryptanalysis of Keccak Variants
- Title not available (Why is that?)
- Key-dependent S-boxes and differential cryptanalysis
- Title not available (Why is that?)
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Bounds in shallows and in miseries
- Symbolic-like computation and conditional differential cryptanalysis of QUARK
- Improved top-down techniques in differential cryptanalysis
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Title not available (Why is that?)
- The triangle differential cryptanalysis
- The phantom of differential characteristics
This page was built for publication: Differential cryptanalysis in the fixed-key model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6163971)