<--- Back to Details
First PageDocument Content
Cryptography / Data Encryption Standard / Linear cryptanalysis / Differential cryptanalysis / Block cipher / Salsa20 / Cryptanalysis / Differential-linear attack / NC / Boomerang attack / Stream cipher / E0
Date: 2018-06-14 07:12:34
Cryptography
Data Encryption Standard
Linear cryptanalysis
Differential cryptanalysis
Block cipher
Salsa20
Cryptanalysis
Differential-linear attack
NC
Boomerang attack
Stream cipher
E0

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 408,73 KB

Share Document on Facebook

Similar Documents

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1qyZS - View Document

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1pVwy - View Document

Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

DocID: 1jtxb - View Document

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

DocID: 1jg52 - View Document

PDF Document

DocID: 1jbLs - View Document