Open Access
Cryptanalysis and design of block ciphers
About:
The article was published on 2003-06-01 and is currently open access. It has received 21 citations till now. The article focuses on the topics: Linear cryptanalysis & Boomerang attack.read more
Citations
More filters
Journal ArticleDOI
An Introduction to Probability Theory and Its Applications. Volume II By William Feller. Pp. xviii, 626. 90s. 1966. (Wiley)
Journal Article
Two attacks on reduced IDEA
TL;DR: A truncated differential attack on a reduced number of rounds of IDEA was presented in this paper, where the secret key was determined by a novel method for determining the secret secret key.
Statistical cryptanalysis of block ciphers
TL;DR: This thesis aims to add a (small) stone to the wall of provable security of block ciphers with the (theoretical and experimental) statistical analysis of the mechanisms behind Matsui's linear cryptanalysis as well as more abstract models of attacks.
Journal Article
Cryptanalysis of SAFER
TL;DR: This paper presents several multiset and boomerang attacks on Safer++ up to 5.5 out of its 7 rounds and significantly improve the previously known results.
Book ChapterDOI
Cryptanalysis of SAFER
TL;DR: In this article, the multiset and boomerang attacks on Safer++ up to 5.5 out of its 7 rounds were presented, which are the best known attacks for this cipher.
References
More filters
Journal ArticleDOI
A mathematical theory of communication
TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.