Differential cryptanalysis of DES-like cryptosystems
From MaRDI portal
Publication:807011
DOI10.1007/BF00630563zbMATH Open0729.68017OpenAlexW1629301835WikidataQ55868749 ScholiaQ55868749MaRDI QIDQ807011FDOQ807011
Authors: Eli Biham, Adi Shamir
Publication date: 1991
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf00630563
Recommendations
differential cryptanalysisdata encryption standarditerated cryptosystemsnew type of cryptanalytic attack
Cites Work
Cited In (only showing first 100 items - show all)
- On the \(c\)-differential spectrum of power functions over finite fields
- Automatic tool for searching for differential characteristics in ARX ciphers and applications
- Doubly perfect nonlinear Boolean permutations
- Security analysis of SIMECK block cipher against related-key impossible differential
- Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9
- New generalized almost perfect nonlinear functions
- On the EA-classes of known APN functions in small dimensions
- Connections among nonlinearity, avalanche and correlation immunity
- The design of composite permutations with applications to DES-like S-boxes
- Primitivity of the group of a cipher involving the action of the key-schedule
- Application based construction and optimization of substitution boxes over 2D mixed chaotic maps
- Regular subgroups with large intersection
- A generation algorithm of a sort of \(P\)-permutations
- Cryptographic functions with interesting properties from CCZ-equivalence
- Differential Cryptanalysis of Keccak Variants
- Improved differential-linear attacks with applications to ARX ciphers
- On 3-to-1 and Power APN S-Boxes
- Differential cryptanalysis of Lucifer
- Differential spectra of a class of power permutations with characteristic 5
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- Some results on the known classes of quadratic APN functions
- Algebraic manipulation detection codes via highly nonlinear functions
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Construction of highly nonlinear permutations on \(\mathbb{Z}_{2p}\) with differential uniformity at most 8
- On construction and (non)existence of \(c\)-(almost) perfect nonlinear functions
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- The retracing boomerang attack
- On a generalization of substitution-permutation networks: the HADES design strategy
- On known constructions of APN and AB functions and their relation to each other
- Some group-theoretical results on Feistel networks in a long-key scenario
- Differential fault analysis on SMS4 using a single fault
- Further cryptographic properties of the multiplicative inverse function
- Improved differential attack on round-reduced LEA
- Differential cryptanalysis of eight-round SEED
- Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity
- The differential spectrum of a ternary power mapping
- A chain of normalizers in the Sylow 2-subgroups of the symmetric group on \({\mathbf{2}}^n\) letters
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- A note on the differential spectrum of a class of power mappings with Niho exponent
- Differential uniformity of the composition of two functions
- More low differential uniformity permutations over \(\mathbb{F}_{2^{2 k}}\) with \(k\) odd
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- Triplicate functions
- The state of the art on the conjecture of exceptional APN functions
- The number of almost perfect nonlinear functions grows exponentially
- A note on the differential spectrum of a differentially 4-uniform power function
- On differential uniformity and nonlinearity of permutations on \(\mathbb{Z}_n\)
- Exceptional crooked functions
- Quadratic almost bent functions -- their partial characterization and design in the spectral domain
- On the diffusion property of iterated functions
- A further study of quadratic APN permutations in dimension nine
- Boomerang uniformity of a class of power maps
- New P\(c\)N and AP\(c\)N functions over finite fields
- Automatic search for the best trails in ARX: application to block cipher \textsc{Speck}
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes
- Deciding EA-equivalence via invariants
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- CCZ-equivalence of bent vectorial functions and related constructions
- Wave-shaped round functions and primitive groups
- Differential attacks: using alternative operations
- On a conjecture on APN permutations
- Analysis of NORX: investigating differential and rotational properties
- Cryptanalysis of the AEAD and hash algorithm DryGASCON
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- Experimental evaluation of book drawing algorithms
- New links between nonlinearity and differential uniformity
- On CCZ-equivalence, extended-affine equivalence, and function twisting
- Affine equivalence in the AES round function
- Fast hashing and stream encryption with \textsc{Panama}
- Non-monomial permutations with differential uniformity six
- Differential Cryptanalysis of Feal and N-Hash
- A note on APN permutations in even dimension
- Two-round iterative characteristics for linear cryptanalysis of modified DES with embedded parity checks
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- RAMus- a new lightweight block cipher for RAM encryption
- On an algorithm generating 2-to-1 APN functions and its applications to ``The big APN problem
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Secure image encryption algorithm design using a novel chaos based S-Box
- Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- On the degree of homogeneous bent functions
- Title not available (Why is that?)
- Title not available (Why is that?)
- Evolutionary computation based cryptanalysis: a first study
- Upper bound of the length of truncated impossible differentials for AES
- The Missing Difference problem, and its applications to counter mode encryption
- Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity
- On a conjecture of differentially 8-uniform power functions
- Zero-correlation attacks: statistical models independent of the number of approximations
- New observations on invariant subspace attack
- Permutation polynomials and their differential properties over residue class rings
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions
- On the symmetric properties of APN functions
- Impossible differential cryptanalysis and integral cryptanalysis of the ACE-class permutation
- Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited
- A new construction of differentially 4-uniform \((n,n-1)\)-functions
This page was built for publication: Differential cryptanalysis of DES-like cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q807011)