ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES
Applications and Techniques in Information Security - Communications in Computer and Information Science
◽
10.1007/978-981-10-5421-1_6
◽
2017
◽
pp. 58-72
◽
Cited By ~ 2
Author(s):
Sourya Kakarla
◽
Srinath Mandava
◽
Dhiman Saha
◽
Dipanwita Roy Chowdhury
Keyword(s):
Differential Cryptanalysis
◽
Practical Implementation
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
Related Documents
Cited By
References
Impossible Differential Cryptanalysis of LBlock Code
JOURNAL OF ELECTRONICS INFORMATION TECHNOLOGY
◽
10.3724/sp.j.1146.2012.01384
◽
2014
◽
Vol 35
(6)
◽
pp. 1516-1519
Author(s):
Jian-sheng Guo
◽
Wei Luo
◽
Lei Zhang
◽
Yuan-bo Guo
Keyword(s):
Differential Cryptanalysis
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher
2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)
◽
10.1109/iscisc.2017.8488362
◽
2017
◽
Author(s):
Aein Rezaei Shahmirzadi
◽
Seyyed Arash Azimi
◽
Mahmoud Salmasizadeh
◽
Javad Mohajeri
◽
Mohammad Reza Aref
Keyword(s):
Block Cipher
◽
Differential Cryptanalysis
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock
Network and System Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-11698-3_14
◽
2014
◽
pp. 184-197
◽
Cited By ~ 1
Author(s):
Jiageng Chen
◽
Yuichi Futa
◽
Atsuko Miyaji
◽
Chunhua Su
Keyword(s):
Scheduling Algorithm
◽
Differential Cryptanalysis
◽
Impossible Differential
◽
Key Scheduling
◽
Impossible Differential Cryptanalysis
Download Full-text
Related-key impossible differential cryptanalysis on lightweight cipher TWINE
Journal of Ambient Intelligence and Humanized Computing
◽
10.1007/s12652-017-0675-1
◽
2018
◽
Vol 10
(2)
◽
pp. 509-517
◽
Cited By ~ 2
Author(s):
Yuechuan Wei
◽
Peng Xu
◽
Yisheng Rong
Keyword(s):
Differential Cryptanalysis
◽
Impossible Differential
◽
Lightweight Cipher
◽
Impossible Differential Cryptanalysis
Download Full-text
New Results in Related Key Impossible Differential Cryptanalysis on Reduced Round AES-192
2018 International Conference On Advances in Communication and Computing Technology (ICACCT)
◽
10.1109/icacct.2018.8529666
◽
2018
◽
Cited By ~ 1
Author(s):
K. B. Jithendra
◽
T. K. Shahana
Keyword(s):
Differential Cryptanalysis
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
A New Method for Impossible Differential Cryptanalysis of 7-Round AES-192
2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing
◽
10.1109/iptc.2011.73
◽
2011
◽
Author(s):
Zhihua Hu
◽
Zhonglin He
Keyword(s):
Differential Cryptanalysis
◽
New Method
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
Progress in Cryptology - AFRICACRYPT 2012 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-31410-0_8
◽
2012
◽
pp. 117-137
◽
Cited By ~ 24
Author(s):
Jiazhe Chen
◽
Meiqin Wang
◽
Bart Preneel
Keyword(s):
Block Ciphers
◽
Differential Cryptanalysis
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis
Advances in Cryptology — ASIACRYPT 2001 - Lecture Notes in Computer Science
◽
10.1007/3-540-45682-1_12
◽
2001
◽
pp. 193-207
◽
Cited By ~ 26
Author(s):
Makoto Sugita
◽
Kazukuni Kobara
◽
Hideki Imai
Keyword(s):
Block Cipher
◽
Differential Cryptanalysis
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
Fast Software Encryption - Lecture Notes in Computer Science
◽
10.1007/3-540-45661-9_4
◽
2002
◽
pp. 49-60
◽
Cited By ~ 28
Author(s):
Dukjae Moon
◽
Kyungdeok Hwang
◽
Wonil Lee
◽
Sangjin Lee
◽
Jongin Lim
Keyword(s):
Differential Cryptanalysis
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
Impossible Differential Cryptanalysis of Surge
IOP Conference Series Earth and Environmental Science
◽
10.1088/1755-1315/440/5/052086
◽
2020
◽
Vol 440
◽
pp. 052086
Author(s):
Zhiqiang Qu
◽
Xuan Shen
◽
Jun He
Keyword(s):
Differential Cryptanalysis
◽
Impossible Differential
◽
Impossible Differential Cryptanalysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close