Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials (1999)

by Eli Biham , Alex Biryukov , Adi Shamir
Citations:115 - 10 self

Active Bibliography

5 Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis – J. Lee, Howard M. Heys, S. E. Tavares - 1997
56 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
5 Miss in the Middle Attacks on IDEA, Khufu and Khafre – Eli Biham, Alex Biryukov, Adi Shamir
4 Key-schedule cryptanalysis of idea, g-des, gost, safer and triple-des – John Kelsey, Bruce Schneier, David Wagner - 1996
17 How to Forge DES-Encrypted Messages in 2^28 Steps – Eli Biham - 1996
6 Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR – Eli Biham , Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir - 1998
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR – Eli Biham Alex, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir - 1998
Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function – Roman Oliynykov
10 Recent Developments in the Design of Conventional Cryptographic Algorithms – Bart Preneel, Vincent Rijmen, Antoon Bosselaers - 1998
21 How to Strengthen DES Using Existing Hardware – Eli Biham , Alex Biryukov
80 Side Channel Cryptanalysis of Product Ciphers – John Kelsey , Bruce Schneier, David Wagner, Chris Hall - 1998
163 Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish – B. Schneier - 1994
35 Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps – Goce Jakimoski, Ljupčo Kocarev, Senior Member - 2001
5 Linear cryptanalysis of substitution-permutation networks – Liam Keliher - 2003
6 A Note on Comparing the AES Candidates – Eli Biham - 1999
30 Differential Cryptanalysis of Feal and N-Hash – Eli Biham, Adi Shamir - 1991
62 A Fast New DES Implementation in Software – Eli Biham - 1997
Differential Cryptanalysis of DES – Chryssis Georgiou - 2000
4 Differential cryptanalysis of the ICE encryption algorithm – Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen - 1998