Differential cryptanalysis

Results: 238



#Item
51Cryptanalysis / Block cipher / MARS / DES-X / Crypt / Advantage / Differential cryptanalysis / Boomerang attack / Cryptography / Data Encryption Standard / Advanced Encryption Standard

MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants John Kelsey and Bruce Schneier Counterpane Internet Security, Inc., 3031 Tisch Way, San Jose, CA 95128 {kelsey,schneier}@counterpane.com

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
52Differential-linear attack / Key schedule / Block cipher / Crypt / Data Encryption Standard / SHACAL / Cryptography / Differential cryptanalysis / ICE

Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
53Blowfish / Ciphertext / Block cipher / Chosen-plaintext attack / Cipher / Cryptanalysis / Advanced Encryption Standard / Stream cipher / Cryptography / Differential cryptanalysis / ICE

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall1 1 Counterpane Systems {hall,kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
54Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / International Data Encryption Algorithm / Key schedule / ICE / KASUMI / Tiny Encryption Algorithm / Block cipher / Cryptography / Boomerang attack / Differential cryptanalysis

Cryptanalysis of Full PRIDE Block Cipher Yibin Dai and Shaozhen Chen State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China Zhengzhou Information Science and Technology Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-09 23:36:44
55Twofish / Differential cryptanalysis / Advanced Encryption Standard / Key schedule / Key size / GOST / Block cipher / Related-key attack / Public-key cryptography / Cryptography / Key management / Weak key

Twofish Technical Report #6 A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish Niels Ferguson∗

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
56Block cipher / Key schedule / Linear cryptanalysis / Advanced Encryption Standard / Cryptanalysis / VEST / Cipher / Feistel cipher / FEAL / Cryptography / Stream ciphers / Differential cryptanalysis

Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-27 11:00:28
57Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
58Differential cryptanalysis / Block cipher / Impossible differential cryptanalysis / E0 / Cryptanalysis / Known-plaintext attack / Chosen-plaintext attack / Advanced Encryption Standard / Ciphertext / Cryptography / Espionage / Boomerang attack

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent John Kelsey1 , Tadayoshi Kohno2? , and Bruce Schneier1 1 Counterpane Internet Security, Inc.

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
59Constrained Application Protocol / Internet of Things / M2M / Computing / Cryptanalysis / Computer security / Intelligence agency / Differential cryptanalysis / Information / Security / Communication / Machine-to-Machine

M2M and IoT Protocols: MQTT, ALLJOYN, DDS and COAP: Why, Where and When Geoff Brown, CEO

Add to Reading List

Source URL: www.eclipsecon.org

Language: English - Date: 2015-04-13 10:57:43
60KASUMI / Block cipher / VEST / Feistel cipher / Linear cryptanalysis / SC2000 / Data Encryption Standard / Cryptography / Differential cryptanalysis / MISTY1

Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-17 09:45:21
UPDATE