Linear cryptanalysis

Results: 154



#Item
41Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2

Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
42Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-27 11:00:28
43Cryptanalysis of ORYX D. Wagner1 , L. Simpson2 , E. Dawson2 , J. Kelsey3 , W. Millan2 , and B. Schneier3 1  University of California, Berkeley

Cryptanalysis of ORYX D. Wagner1 , L. Simpson2 , E. Dawson2 , J. Kelsey3 , W. Millan2 , and B. Schneier3 1 University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
44Cryptanalysis of FROG David Wagner∗ Niels Ferguson†  Bruce Schneier‡

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
45Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1  Department of Mathematics and System Science, Science College,

Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-17 09:45:21
46New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1  3

New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-03 02:21:46
47Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ;  Abstract. RAKAPOSHI is a hardware oriented

Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ; Abstract. RAKAPOSHI is a hardware oriented

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 08:22:28
48A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang1 , Zhenzhen Bao1 , Vincent Rijmen2 , Meicheng Liu1 1.State Key Laboratory of Information Security, Institu

A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang1 , Zhenzhen Bao1 , Vincent Rijmen2 , Meicheng Liu1 1.State Key Laboratory of Information Security, Institu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 23:46:18
49Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KU

Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KU

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 10:17:39
50KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee  Combined Differential, Linear and Related-Key Attacks

KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 12:43:02