scispace - formally typeset
Open Access

Cryptanalysis and design of block ciphers

About
The article was published on 2003-06-01 and is currently open access. It has received 21 citations till now. The article focuses on the topics: Linear cryptanalysis & Boomerang attack.

read more

Citations
More filters
Journal Article

Two attacks on reduced IDEA

TL;DR: A truncated differential attack on a reduced number of rounds of IDEA was presented in this paper, where the secret key was determined by a novel method for determining the secret secret key.

Statistical cryptanalysis of block ciphers

Pascal Junod
TL;DR: This thesis aims to add a (small) stone to the wall of provable security of block ciphers with the (theoretical and experimental) statistical analysis of the mechanisms behind Matsui's linear cryptanalysis as well as more abstract models of attacks.
Journal Article

Cryptanalysis of SAFER

TL;DR: This paper presents several multiset and boomerang attacks on Safer++ up to 5.5 out of its 7 rounds and significantly improve the previously known results.
Book ChapterDOI

Cryptanalysis of SAFER

TL;DR: In this article, the multiset and boomerang attacks on Safer++ up to 5.5 out of its 7 rounds were presented, which are the best known attacks for this cipher.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.