Differential cryptanalysis of DES-like cryptosystems
From MaRDI portal
Publication:807011
DOI10.1007/BF00630563zbMATH Open0729.68017OpenAlexW1629301835WikidataQ55868749 ScholiaQ55868749MaRDI QIDQ807011FDOQ807011
Authors: Eli Biham, Adi Shamir
Publication date: 1991
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf00630563
Recommendations
differential cryptanalysisdata encryption standarditerated cryptosystemsnew type of cryptanalytic attack
Cites Work
Cited In (only showing first 100 items - show all)
- On the \(c\)-differential spectrum of power functions over finite fields
- Automatic tool for searching for differential characteristics in ARX ciphers and applications
- Doubly perfect nonlinear Boolean permutations
- Security analysis of SIMECK block cipher against related-key impossible differential
- Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9
- New generalized almost perfect nonlinear functions
- On the EA-classes of known APN functions in small dimensions
- Connections among nonlinearity, avalanche and correlation immunity
- The design of composite permutations with applications to DES-like S-boxes
- Primitivity of the group of a cipher involving the action of the key-schedule
- Application based construction and optimization of substitution boxes over 2D mixed chaotic maps
- Regular subgroups with large intersection
- A generation algorithm of a sort of \(P\)-permutations
- Cryptographic functions with interesting properties from CCZ-equivalence
- Differential Cryptanalysis of Keccak Variants
- Improved differential-linear attacks with applications to ARX ciphers
- On 3-to-1 and Power APN S-Boxes
- Differential cryptanalysis of Lucifer
- Differential spectra of a class of power permutations with characteristic 5
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- Some results on the known classes of quadratic APN functions
- Algebraic manipulation detection codes via highly nonlinear functions
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Construction of highly nonlinear permutations on \(\mathbb{Z}_{2p}\) with differential uniformity at most 8
- On construction and (non)existence of \(c\)-(almost) perfect nonlinear functions
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- The retracing boomerang attack
- On a generalization of substitution-permutation networks: the HADES design strategy
- On known constructions of APN and AB functions and their relation to each other
- Some group-theoretical results on Feistel networks in a long-key scenario
- Differential fault analysis on SMS4 using a single fault
- Further cryptographic properties of the multiplicative inverse function
- Improved differential attack on round-reduced LEA
- Differential cryptanalysis of eight-round SEED
- Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity
- The differential spectrum of a ternary power mapping
- A chain of normalizers in the Sylow 2-subgroups of the symmetric group on \({\mathbf{2}}^n\) letters
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- A note on the differential spectrum of a class of power mappings with Niho exponent
- Differential uniformity of the composition of two functions
- More low differential uniformity permutations over \(\mathbb{F}_{2^{2 k}}\) with \(k\) odd
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- Triplicate functions
- The state of the art on the conjecture of exceptional APN functions
- The number of almost perfect nonlinear functions grows exponentially
- A note on the differential spectrum of a differentially 4-uniform power function
- On differential uniformity and nonlinearity of permutations on \(\mathbb{Z}_n\)
- Exceptional crooked functions
- Quadratic almost bent functions -- their partial characterization and design in the spectral domain
- On the diffusion property of iterated functions
- A further study of quadratic APN permutations in dimension nine
- Boomerang uniformity of a class of power maps
- New P\(c\)N and AP\(c\)N functions over finite fields
- Automatic search for the best trails in ARX: application to block cipher \textsc{Speck}
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes
- Deciding EA-equivalence via invariants
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups
- A framework to optimize implementations of matrices
- Generic attacks with standard deviation analysis on a-Feistel schemes
- The block cipher \textsc{Square}
- The rebound attack and subspace distinguishers: application to Whirlpool
- Involutory differentially 4-uniform permutations from known constructions
- A note on some algebraic trapdoors for block ciphers
- Can a differential attack work for an arbitrarily large number of rounds?
- On differential uniformity of maps that may hide an algebraic trapdoor
- A tutorial on linear and differential cryptanalysis
- Higher Order Differential Attack of a CAST Cipher
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- Linear and differential cryptanalysis: another viewpoint
- Efficient cache attacks on AES, and countermeasures
- Related-Key Differential-Linear Attacks on Reduced AES-192
- Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Notions and relations for RKA-secure permutation and function families
- New Lightweight DES Variants
- Some results concerning cryptographically significant mappings over \(\text{GF}(2^{n})\)
- On full differential uniformity of permutations on the ring of integers modulo \(n\)
- Differentially low uniform permutations from known 4-uniform functions
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Variants of the AES key schedule for better truncated differential bounds
- Simpira v2: a family of efficient permutations using the AES round function
- Note on impossible differential attacks
- A chaos-based approach to the design of cryptographically secure substitutions
- On the boomerang uniformity of some permutation polynomials
- A note on complete polynomials over finite fields and their applications in cryptography
- If a generalised butterfly is APN then it operates on 6 bits
- Quantum attacks on some Feistel block ciphers
- Differential fault analysis on block cipher SEED
- Bent functions on a finite nonabelian group
- Boomerang uniformity of popular S-box constructions
- Differential Cryptanalysis of Reduced-Round PRESENT
- Steganography of capacity required using modulo operator for embedding secret image
- Troika: a ternary cryptographic hash function
- On Cryptographically Significant Mappings over GF(2 n )
- Analysis of mixing properties of the operations of modular addition and bitwise addition defined on one carrier
This page was built for publication: Differential cryptanalysis of DES-like cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q807011)