Corpus ID: 12350519

Differential Cryptanalysis of Feal and N-Hash Eli

@inproceedings{Shamir2001DifferentialCO,
  title={Differential Cryptanalysis of Feal and N-Hash Eli},
  author={Biham Adi Shamir},
  year={2001}
}
In [1,2] we introduced the notion of differential cryptanalysis and described its application to DES[8] and several of its variants. In this paper we show the applicability of differential cryptanalysis to the Feal family of encryption algorithms and to the N-Hash hash function. 

Figures and Tables from this paper

References

SHOWING 1-7 OF 7 REFERENCES
128-bit hash function ("-Huh), proceedings of SECURICOM
  • 1990
A& Shamir
  • Differential Cryptanalysis of DES-like Cryptosys tem (eztended abstract), Advances in cryptology, proceedings of CRYPTO 90,
  • 1990
Differential Cryptanalysis of DES-like Cryptosystems
Cryptanalysis ofF.E.A.L
  • Advances in cryptology, proceedings of EUROCRYPT
  • 1988
Fast Data Encryption Algorithm Feal-8
  • Review of electrical communications laboratories, Vol. 36, No. 4,
  • 1988
Abstracts of EUROCRYPT 87
  • Amsterdam, April
  • 1987
Fast Data Encryption Algorithm Fed
  • Advances in cryptology, proceedings of EUROCRYPT
  • 1987