Differential cryptanalysis of DES-like cryptosystems
From MaRDI portal
Publication:807011
DOI10.1007/BF00630563zbMATH Open0729.68017OpenAlexW1629301835WikidataQ55868749 ScholiaQ55868749MaRDI QIDQ807011FDOQ807011
Authors: Eli Biham, Adi Shamir
Publication date: 1991
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf00630563
Recommendations
differential cryptanalysisdata encryption standarditerated cryptosystemsnew type of cryptanalytic attack
Cites Work
Cited In (only showing first 100 items - show all)
- On the \(c\)-differential spectrum of power functions over finite fields
- Automatic tool for searching for differential characteristics in ARX ciphers and applications
- Doubly perfect nonlinear Boolean permutations
- Security analysis of SIMECK block cipher against related-key impossible differential
- Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9
- New generalized almost perfect nonlinear functions
- On the EA-classes of known APN functions in small dimensions
- Connections among nonlinearity, avalanche and correlation immunity
- The design of composite permutations with applications to DES-like S-boxes
- Primitivity of the group of a cipher involving the action of the key-schedule
- Application based construction and optimization of substitution boxes over 2D mixed chaotic maps
- Regular subgroups with large intersection
- A generation algorithm of a sort of \(P\)-permutations
- Cryptographic functions with interesting properties from CCZ-equivalence
- Differential Cryptanalysis of Keccak Variants
- Improved differential-linear attacks with applications to ARX ciphers
- On 3-to-1 and Power APN S-Boxes
- Differential cryptanalysis of Lucifer
- Differential spectra of a class of power permutations with characteristic 5
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- Some results on the known classes of quadratic APN functions
- Algebraic manipulation detection codes via highly nonlinear functions
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Construction of highly nonlinear permutations on \(\mathbb{Z}_{2p}\) with differential uniformity at most 8
- On construction and (non)existence of \(c\)-(almost) perfect nonlinear functions
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- The retracing boomerang attack
- On a generalization of substitution-permutation networks: the HADES design strategy
- On known constructions of APN and AB functions and their relation to each other
- Some group-theoretical results on Feistel networks in a long-key scenario
- Differential fault analysis on SMS4 using a single fault
- Further cryptographic properties of the multiplicative inverse function
- Improved differential attack on round-reduced LEA
- Differential cryptanalysis of eight-round SEED
- Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity
- The differential spectrum of a ternary power mapping
- A chain of normalizers in the Sylow 2-subgroups of the symmetric group on \({\mathbf{2}}^n\) letters
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- A note on the differential spectrum of a class of power mappings with Niho exponent
- Differential uniformity of the composition of two functions
- More low differential uniformity permutations over \(\mathbb{F}_{2^{2 k}}\) with \(k\) odd
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- Triplicate functions
- The state of the art on the conjecture of exceptional APN functions
- The number of almost perfect nonlinear functions grows exponentially
- A note on the differential spectrum of a differentially 4-uniform power function
- On differential uniformity and nonlinearity of permutations on \(\mathbb{Z}_n\)
- Exceptional crooked functions
- Quadratic almost bent functions -- their partial characterization and design in the spectral domain
- On the diffusion property of iterated functions
- A further study of quadratic APN permutations in dimension nine
- Boomerang uniformity of a class of power maps
- New P\(c\)N and AP\(c\)N functions over finite fields
- Automatic search for the best trails in ARX: application to block cipher \textsc{Speck}
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes
- Deciding EA-equivalence via invariants
- On the relationships between perfect nonlinear functions and universal hash families
- Title not available (Why is that?)
- A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\)
- More differentially 6-uniform power functions
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- On the differential and linear efficiency of balanced Feistel networks
- Higher Order Derivatives and Differential Cryptanalysis
- A new large class of functions not APN infinitely often
- A novel heuristic method for obtaining \(S\)-boxes
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- A construction of novel chaos base nonlinear component of block cipher
- Binomial differentially 4 uniform permutations with high nonlinearity
- Permutation polynomials EA-equivalent to the inverse function over \(\mathrm{GF}(2^n)\)
- Title not available (Why is that?)
- Higher order differentiation over finite fields with applications to generalising the cube attack
- Impossible differential attacks on 13-round CLEFIA-128
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- New commutative semifields defined by new PN multinomials
- Nonlinearities of S-boxes
- New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\)
- Algebraic Cryptanalysis of the Data Encryption Standard
- Differentially 4-uniform bijections by permuting the inverse function
- A cryptanalytic time-memory trade-off
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)
- On some block ciphers and imprimitive groups
- Constructing new APN functions from known ones
- Title not available (Why is that?)
- Title not available (Why is that?)
- A homophonic DES
- Another look at normal approximations in cryptanalysis
- Provable security for 13 round Skipjack-like structure
- A new spatiotemporally chaotic cryptosystem and its security and performance analyses
- An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks
- Linear Cryptanalysis of Non Binary Ciphers
- Highly nonlinear mappings
- Probability distributions of correlation and differentials in block ciphers
- G-perfect nonlinear functions
- Algebraic nonlinearity and its applications to cryptography
- New types of cryptanalytic attacks using related keys
This page was built for publication: Differential cryptanalysis of DES-like cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q807011)