Improved Impossible Differential Cryptanalysis of Rijndael and Crypton (2001)

Cached

Download Links

by Jung Hee Cheon , MunJu Kim , Kwangjo Kim , Jung-Yeun Lee , SungWoo Kang
Citations:18 - 0 self

Active Bibliography

4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
Contents Self Evaluation: Hierocrypt–L1 Toshiba Corporation – unknown authors - 2000
Specification on a Block Cipher: Hierocrypt—L1 – Toshiba Corporation - 2001
8 A Meet-in-the-Middle Attack on 8-Round AES – Hüseyin Demirci, Ali Aydın Selçuk
Improved “Partial Sums”-based Square Attack on AES – Michael Tunstall
Practical Complexity Differential Cryptanalysis and Fault Analysis of AES – Michael Tunstall
11 Related-Key Rectangle Attacks on Reduced AES192 and AES-256 – Jongsung Kim, Seokhie Hong, Bart Preneel - 2007
2 Energy Efficient Wireless Encryption – Chetan Nanjunda Mathur, K. P. Subbalakshmi
Date – Chetan N. Mathur, Dr. R. Chandramouli, Dr. Yu-dong Yao, Dr. Barry Bunin, Dr. Zhenqi Zhu
On the Order of Round Components in the AES – Jorge Nakahara - 2006
Analysis of Venkaiah et al.’s AES Design – Jorge Nakahara - 2006
3 Energy efficient security framework for wireless local area networks – Phongsak Kiratiwintakorn, Dr. Sujata Banerjee, Hewlett-packard Lab, Phongsak Kiratiwintakorn Phd - 2000
The Block Cipher: SEA2 With Provable Resistance Against DC and LC Attacks – Shih-hsu Chang, Fang-hsuan Cheng, Wen-hsing Hsu - 1999
1 Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis – Kenji Ohkuma, Hideo Shimizu, Fumihiko Sano, Shinichi Kawamura - 2001
DIFFERENTIAL CRYPTANALYSIS FOR A 3-ROUND SPN – M. Tolga Sakalli, Ercan Bulus, Andac Sžahin, Fatma Buyuksaracoglu
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher ⋆ – Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-alain Fouque
9 On the Design of Linear Transformations for Substitution Permutation Encryption Networks – A. M. Youssef, S. Mister, S. E. Tavares - 1997
Security Evaluation of MISTY Structure with SPN Round Function – Ruilin Li, Chao Li, Jinshu Su, Bing Sun
5 Refined analysis of bounds related to linear and differential cryptanalysis for the AES – Liam Keliher - 2005