Improved Top-Down Techniques in Differential Cryptanalysis
暂无分享,去创建一个
Adi Shamir | Itai Dinur | Orr Dunkelman | Masha Gutman | A. Shamir | O. Dunkelman | Itai Dinur | Masha Gutman
[1] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[2] Joan Daemen,et al. Limitations of the Even-Mansour Construction , 1991, ASIACRYPT.
[3] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.
[4] Lars R. Knudsen,et al. Provable Security Against Differential Cryptanalysis , 1992, CRYPTO.
[5] Joos Vandewalle,et al. A New Approach to Block Cipher Design , 1993, FSE.
[6] Mitsuru Matsui,et al. On Correlation Between the Order of S-boxes and the Strength of DES , 1994, EUROCRYPT.
[7] Kazumaro Aoki,et al. Best Differential Characteristic Search of FEAL , 1996, FSE.
[8] Eli Biham,et al. Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials , 1999, Journal of Cryptology.
[9] Christophe De Cannière,et al. Finding SHA-1 Characteristics: General Results and Applications , 2006, ASIACRYPT.
[10] Yishay Mansour,et al. A construction of a cipher from a single pseudorandom permutation , 1997, Journal of Cryptology.
[11] Ivica Nikolic,et al. Tweaking AES , 2010, Selected Areas in Cryptography.
[12] Alex Biryukov,et al. Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others , 2010, EUROCRYPT.
[13] Florian Mendel,et al. Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions , 2011, ASIACRYPT.
[14] Dawu Gu,et al. Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming , 2011, Inscrypt.
[15] Alex Biryukov,et al. Search for Related-Key Differential Characteristics in DES-Like Ciphers , 2011, FSE.
[16] John P. Steinberger,et al. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations , 2012, IACR Cryptol. ePrint Arch..
[17] Vincent Rijmen,et al. Differential Analysis of the LED Block Cipher , 2012, IACR Cryptol. ePrint Arch..
[18] Gaëtan Leurent,et al. Analysis of Differential Attacks in ARX Constructions , 2012, ASIACRYPT.
[19] Pulak Mishra,et al. Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .
[20] Adi Shamir,et al. Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 , 2013, IACR Cryptol. ePrint Arch..
[21] Hoda AlKhzaimi,et al. Cryptanalysis of the SIMON Family of Block Ciphers , 2013, IACR Cryptol. ePrint Arch..
[22] Kristin E. Lauter,et al. Selected Areas in Cryptography -- SAC 2013 , 2013, Lecture Notes in Computer Science.
[23] Jason Smith,et al. The SIMON and SPECK Families of Lightweight Block Ciphers , 2013, IACR Cryptol. ePrint Arch..
[24] Thomas Peyrin,et al. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 , 2013, CRYPTO.
[25] Alex Biryukov,et al. Differential Analysis of Block Ciphers SIMON and SPECK , 2014, FSE.
[26] Alex Biryukov,et al. Automatic Search for Differential Trails in ARX Ciphers , 2014, CT-RSA.
[27] Lei Hu,et al. Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers , 2014, ASIACRYPT.
[28] Stefan Lucks,et al. Differential Cryptanalysis of Round-Reduced Simon and Speck , 2014, FSE.
[29] Lei Hu,et al. Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications , 2014, IACR Cryptol. ePrint Arch..
[30] Jason Smith,et al. SIMON and SPECK: Block Ciphers for the Internet of Things , 2015, IACR Cryptol. ePrint Arch..