Differential cryptanalysis

Results: 238



#Item
81Differential cryptanalysis / Block cipher / Block size / Q / Key schedule / LEX / Cryptography / Advanced Encryption Standard / Rijndael S-box

Microsoft PowerPoint - AES

Add to Reading List

Source URL: www.utdallas.edu

Language: English - Date: 2008-01-22 12:55:04
82Differential cryptanalysis / ICE / Boomerang attack / International Data Encryption Algorithm / Differential-linear attack / Data Encryption Standard / Cryptography / Block ciphers / Linear cryptanalysis

Improved Linear Trails for the Block Cipher Simon Tomer Ashur ESAT/COSIC KU Leuven and iMinds Leuven, Belgium tomer.ashur @ esat.kuleuven.be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 14:24:24
83MD5 / MD4 / Preimage attack / Collision attack / Differential cryptanalysis / Hash function / RIPEMD / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / SHA-1

Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-08-25 02:24:24
84MISTY1 / Cryptanalysis / Block cipher / Linear cryptanalysis / Interpolation attack / Ciphertext / Chosen-plaintext attack / ICE / Data Encryption Standard / Cryptography / Differential cryptanalysis / KASUMI

3-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:39:19
85Linear cryptanalysis / Cryptanalysis / ICE / Higher-order differential cryptanalysis / Advanced Encryption Standard / MISTY1 / Chosen-plaintext attack / FEAL / Boomerang attack / Cryptography / Differential cryptanalysis / Block cipher

3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis is consi

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:38:35
86KASUMI / Cryptanalysis / Block cipher / Ciphertext / Feistel cipher / ICE / Chosen-plaintext attack / Symmetric-key algorithm / Linear cryptanalysis / Cryptography / Differential cryptanalysis / MISTY1

3-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:34:21
87LOKI / Khufu and Khafre / Lucifer / Ciphertext / Advanced Encryption Standard / REDOC / Padding / Cryptanalysis / Cryptographic hash function / Cryptography / Differential cryptanalysis / Block cipher

Microsoft Word - Klima_SPI_2007_EN

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2007-05-05 06:57:26
88Advanced Encryption Standard / Key schedule / Linear cryptanalysis / GOST / Differential-linear attack / Cipher / ICE / Serpent / Cryptanalysis / Cryptography / Block ciphers / Differential cryptanalysis

SEA a Scalable Encryption Algorithm for Small Embedded Applications Fran¸cois-Xavier Standaert1,2 , Gilles Piret1 , Neil Gershenfeld2 , Jean-Jacques Quisquater1 1

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
89Keystream / Rotor machine / Cipher / Cryptanalysis / One-time pad / Block cipher / Enigma machine / Linear cryptanalysis / Differential cryptanalysis / Cryptography / Stream ciphers / Substitution cipher

Algorithms and Mechanisms Cryptography is nothing more than a mathematical framework for discussing the implications of various paranoid delusions — Don Alvarez

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2005-10-26 13:01:48
90Block cipher / Differential cryptanalysis / Tiger / Py / Eli Biham / Advanced Encryption Standard / Cryptanalysis / MD4 / Index of cryptography articles / Cryptography / Cryptographic hash functions / Stream ciphers

FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-10 16:40:02
UPDATE