Differential Cryptanalysis of Feal and N-Hash (1991)

Cached

Download Links

by Eli Biham , Adi Shamir
Citations:30 - 2 self

Active Bibliography

106 Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials – Eli Biham, Alex Biryukov, Adi Shamir - 1999
17 How to Forge DES-Encrypted Messages in 2^28 Steps – Eli Biham - 1996
3 Design principles for dedicated hash functions – Bart Preneel - 1994
3 A Study on the Construction and Analysis of Substitution Boxes for Symmetric Cryptosystems – Kwangjo Kim, For Symmetric Cryptosystems - 1990
35 Cryptographic Hash Functions: A Survey – S. Bakhtiari, R. Safavi-naini, J. Pieprzyk, Centre Computer - 1995
Differential Cryptanalysis of DES – Chryssis Georgiou - 2000
3 The Applications of Genetic Algorithms in Cryptanalysis – A.J. Bagnall - 1996
4 Linear cryptanalysis of substitution-permutation networks – Liam Keliher - 2003
1 Spectral Properties of Boolean Functions, Graphs and Graph States – Constanza Riera - 2005
Differential Attack on Five Rounds of the SC2000 Block – Jiqiang Lu
2 Differential and Linear Cryptanalysis of ReducedRound SC2000 – Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman - 2002
1 A Generalised Testbed for Analysing Block and Stream Ciphers – Lawrence Brown, Josef PIEPRZYK, Reihaneh Safavi-naini, Jennifer Seberry - 1991
4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
Nondegenerate Functions and Permutations – Luke O'Connor
1 ATM cell based security implementation – Ana Gamage, Jussipekka Leiwo, Yuliang Zheng - 1997
10 Towards Secure and Fast Hash Functions – Takashi Satoh, Mio Haga, Kaoru Kurosawa - 1999
5 Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis – J. Lee, Howard M. Heys, S. E. Tavares - 1997
60 A Fast New DES Implementation in Software – Eli Biham - 1997
1 Observations on Information Security Crisis – Jussipekka Leiwo