Differential cryptanalysis in the fixed-key model
From MaRDI portal
Publication:6163971
Recommendations
Cites work
- scientific article; zbMATH DE number 503238 (Why is no real title available?)
- scientific article; zbMATH DE number 708826 (Why is no real title available?)
- scientific article; zbMATH DE number 708827 (Why is no real title available?)
- scientific article; zbMATH DE number 1455107 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- A geometric approach to linear cryptanalysis
- Analysis of differential attacks in ARX constructions
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- Block cipher invariants as eigenvectors of correlation matrices
- Differential analysis of block ciphers \textsc{Simon} and \textsc{Speck}
- Differential analysis of the LED block cipher
- Differential cryptanalysis of round-reduced \textsc{Simon} and \textsc{Speck}
- Finding SHA-1 Characteristics: General Results and Applications
- How to Break MD5 and Other Hash Functions
- Improved Differential Cryptanalysis of Round-Reduced Speck
- Linear Cryptanalysis of Reduced Round Serpent
- Markov Ciphers and Differential Cryptanalysis
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- On CCZ-equivalence of addition mod \(2^n\)
- PRESENT: An Ultra-Lightweight Block Cipher
- The phantom of differential characteristics
Cited in
(19)- Differential Cryptanalysis of the ICE Encryption Algorithm
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- On perfect linear approximations and differentials over two-round SPNs
- Impact of the Hamming weight of the difference of two random variables on the probability of its preservation after addition and subtraction
- Differential Cryptanalysis of Keccak Variants
- Differential Propagation Analysis of Keccak
- Clustering effect of iterative differential and linear trails
- More insight on deep learning-aided cryptanalysis
- scientific article; zbMATH DE number 1676630 (Why is no real title available?)
- Key-dependent S-boxes and differential cryptanalysis
- scientific article; zbMATH DE number 697800 (Why is no real title available?)
- Bounds in shallows and in miseries
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Symbolic-like computation and conditional differential cryptanalysis of QUARK
- Improved top-down techniques in differential cryptanalysis
- Conditional Differential Cryptanalysis of Trivium and KATAN
- scientific article; zbMATH DE number 1303117 (Why is no real title available?)
- The triangle differential cryptanalysis
- The phantom of differential characteristics
This page was built for publication: Differential cryptanalysis in the fixed-key model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6163971)