Impossible differential cryptanalysis

Results: 19



#Item
1Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
2Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
3The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.co.jp

Language: English - Date: 2011-03-09 03:41:21
4

PDF Document

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-03-18 00:53:23
5Twofish Technical Report #5  Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
6Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent John Kelsey1 , Tadayoshi Kohno2? , and Bruce Schneier1 1  Counterpane Internet Security, Inc.

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent John Kelsey1 , Tadayoshi Kohno2? , and Bruce Schneier1 1 Counterpane Internet Security, Inc.

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
7New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1  3

New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-03 02:21:46
8KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee  Combined Differential, Linear and Related-Key Attacks

KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 12:43:02
9New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1 4

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 08:22:01
10A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1  Department of Computer Science and Engineering, Shanghai Jiaotong University

A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1 Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-09-06 23:14:46