Differential cryptanalysis of DES-like cryptosystems
From MaRDI portal
Publication:807011
DOI10.1007/BF00630563zbMATH Open0729.68017OpenAlexW1629301835WikidataQ55868749 ScholiaQ55868749MaRDI QIDQ807011FDOQ807011
Authors: Eli Biham, Adi Shamir
Publication date: 1991
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf00630563
Recommendations
differential cryptanalysisdata encryption standarditerated cryptosystemsnew type of cryptanalytic attack
Cites Work
Cited In (only showing first 100 items - show all)
- On the relationships between perfect nonlinear functions and universal hash families
- Title not available (Why is that?)
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- More differentially 6-uniform power functions
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- On the differential and linear efficiency of balanced Feistel networks
- Higher Order Derivatives and Differential Cryptanalysis
- A new large class of functions not APN infinitely often
- A novel heuristic method for obtaining \(S\)-boxes
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- A construction of novel chaos base nonlinear component of block cipher
- Binomial differentially 4 uniform permutations with high nonlinearity
- Permutation polynomials EA-equivalent to the inverse function over \(\mathrm{GF}(2^n)\)
- Title not available (Why is that?)
- Higher order differentiation over finite fields with applications to generalising the cube attack
- Impossible differential attacks on 13-round CLEFIA-128
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- New commutative semifields defined by new PN multinomials
- Nonlinearities of S-boxes
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
- Algebraic Cryptanalysis of the Data Encryption Standard
- Differentially 4-uniform bijections by permuting the inverse function
- A cryptanalytic time-memory trade-off
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- On some block ciphers and imprimitive groups
- Constructing new APN functions from known ones
- Title not available (Why is that?)
- Title not available (Why is that?)
- A homophonic DES
- Another look at normal approximations in cryptanalysis
- Provable security for 13 round Skipjack-like structure
- A new spatiotemporally chaotic cryptosystem and its security and performance analyses
- An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks
- Linear Cryptanalysis of Non Binary Ciphers
- Highly nonlinear mappings
- Probability distributions of correlation and differentials in block ciphers
- G-perfect nonlinear functions
- Algebraic nonlinearity and its applications to cryptography
- New types of cryptanalytic attacks using related keys
- Analysis of \(3\)-line generalized Feistel networks with double SD-functions
- Known-Key Distinguishers for Some Block Ciphers
- Related-key attack on full-round PICARO
- Characterization of almost perfect nonlinear functions in terms of subfunctions
- On equivalence between known families of quadratic APN functions
- On the Walsh spectrum of a family of quadratic APN functions with five terms
- On EA-equivalence of certain permutations to power mappings
- On unbalanced feistel networks with contracting MDS diffusion
- Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
- A method for designing strong S-Boxes based on chaotic Lorenz system
- On the differential uniformities of functions over finite fields
- Permutation polynomials with low differential uniformity over finite fields of odd characteristic
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
- Designing S-boxes based on 3-D four-wing autonomous chaotic system
- A novel method of S-box design based on chaotic map and composition method
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
- On group rings and some of their applications to combinatorics and symmetric cryptography
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- Distinguishing distributions using Chernoff information
- Multiple differential cryptanalysis: theory and practice
- Constructing differentially 4-uniform permutations over \(\mathrm{GF}(2^{2m})\) from quadratic APN permutations over \(\mathrm{GF}(2^{2m+1})\)
- A new characterization of semi-bent and bent functions on finite fields
- Title not available (Why is that?)
- NON-BOOLEAN ALMOST PERFECT NONLINEAR FUNCTIONS ON NON-ABELIAN GROUPS
- A block cipher with dynamic S-boxes based on tent map
- On-line/off-line digital signatures
- On cross-correlation indicators of an S-box
- Improved top-down techniques in differential cryptanalysis
- Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function
- Provable security against a differential attack
- Results on rotation-symmetric S-boxes
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- On isotopisms of commutative presemifields and CCZ-equivalence of functions
- MATRIX REPRESENTATIONS OF BOOLEAN FUNCTIONS AND THEIR APPLICATION
- New secondary constructions of differentially 4-uniform permutations over \(\mathbb F_{2^{2k}}\)
- New Perfect Nonlinear Multinomials over F $_{p^{2k}}$ for Any Odd Prime p
- A method for designing dynamical S-boxes based on discretized chaotic map
- A novel method for designing S-boxes based on chaotic maps
- Rapid solution of problems by quantum computation
- Constructing new differentially 4-uniform permutations from known ones
- Image encryption using \(q\)-deformed logistic map
- On quadratic approximations in block ciphers
- More constructions of APN and differentially 4-uniform functions by concatenation
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- CCZ-equivalence of bent vectorial functions and related constructions
- Wave-shaped round functions and primitive groups
- Differential attacks: using alternative operations
- On a conjecture on APN permutations
- Analysis of NORX: investigating differential and rotational properties
- Cryptanalysis of the AEAD and hash algorithm DryGASCON
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- Experimental evaluation of book drawing algorithms
- New links between nonlinearity and differential uniformity
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- Affine equivalence in the AES round function
- Fast hashing and stream encryption with \textsc{Panama}
- Non-monomial permutations with differential uniformity six
- Differential Cryptanalysis of Feal and N-Hash
- A note on APN permutations in even dimension
- Two-round iterative characteristics for linear cryptanalysis of modified DES with embedded parity checks
This page was built for publication: Differential cryptanalysis of DES-like cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q807011)