Improved Top-Down Techniques in Differential Cryptanalysis
From MaRDI portal
Publication:2946446
DOI10.1007/978-3-319-22174-8_8zbMath1370.94505OpenAlexW2173212622MaRDI QIDQ2946446
Masha Gutman, Itai Dinur, Adi Shamir, Orr Dunkelman
Publication date: 17 September 2015
Published in: Progress in Cryptology -- LATINCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-22174-8_8
Related Items (3)
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation ⋮ The Oribatida v1.3 family of lightweight authenticated encryption schemes
Cites Work
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- Tweaking AES
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Markov Ciphers and Differential Cryptanalysis
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- A new approach to block cipher design
- Best differential characteristic search of FEAL
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Analysis of Differential Attacks in ARX Constructions
- Automatic Search for Differential Trails in ARX Ciphers
- Finding SHA-1 Characteristics: General Results and Applications
This page was built for publication: Improved Top-Down Techniques in Differential Cryptanalysis