Differential cryptanalysis

Results: 238



#Item
11A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-10 00:56:36
12Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
13Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
14Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
15Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:42
16ISCOn Security of a White-Box Implementation of SHARK  Yang SHI and Hongfei FAN

ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-20 14:17:24
17Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-24 15:27:13
    18Mixed-integer Programming based Differential and Linear Cryptanalysis Siwei Sun State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Data Assurance and Communica

    Mixed-integer Programming based Differential and Linear Cryptanalysis Siwei Sun State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Data Assurance and Communica

    Add to Reading List

    Source URL: www1.spms.ntu.edu.sg

    Language: English - Date: 2015-10-05 00:19:26
      19The Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2 1 ProtonWorld, Zweefvliegtuigstraat 10, B-1130 Brussel, Belgium

      The Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2 1 ProtonWorld, Zweefvliegtuigstraat 10, B-1130 Brussel, Belgium

      Add to Reading List

      Source URL: jda.noekeon.org

      Language: English - Date: 2013-08-28 07:53:38
      20Differential-Linear Cryptanalysis Revisited C´eline Blondeau1 and Gregor Leander2 and Kaisa Nyberg1 1 2

      Differential-Linear Cryptanalysis Revisited C´eline Blondeau1 and Gregor Leander2 and Kaisa Nyberg1 1 2

      Add to Reading List

      Source URL: users.ics.aalto.fi

      Language: English - Date: 2014-03-13 03:39:21