×

Found 28 Documents (Results 1–28)

eSPF: a family of format-preserving encryption algorithms using MDS matrices. (English) Zbl 1506.94030

Ali, Sk Subidh (ed.) et al., Security, privacy, and applied cryptography engineering. 7th international conference, SPACE 2017, Goa, India, December 13–17, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10662, 133-150 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On linear hulls and trails. (English) Zbl 1394.94927

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49889-8/pbk; 978-3-319-49890-4/ebook). Lecture Notes in Computer Science 10095, 269-286 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Automatic search of meet-in-the-middle and impossible differential attacks. (English) Zbl 1372.94422

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 157-184 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers. (English) Zbl 1306.94093

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 158-178 (2014).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. (English) Zbl 1295.94110

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 244-264 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New insights on impossible differential cryptanalysis. (English) Zbl 1292.94037

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 243-259 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Search for related-key differential characteristics in DES-like ciphers. (English) Zbl 1282.94033

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 18-34 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

LBlock: a lightweight block cipher. (English) Zbl 1250.94047

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 327-344 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Greedy distinguishers and nonrandomness detectors. (English) Zbl 1294.94078

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 210-226 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others. (English) Zbl 1280.94041

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 322-344 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved impossible differential cryptanalysis of reduced-round Camellia. (English) Zbl 1256.94069

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 442-456 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A toolbox for cryptanalysis: Linear and affine equivalence algorithms. (English) Zbl 1038.94521

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 33-50 (2003).
MSC:  94A60 68P25 94A17
PDFBibTeX XMLCite
Full Text: Link

Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. (English) Zbl 1062.94554

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 193-207 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software