All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
Cryptanalysis
Known as:
Cryptoanalyst
, Cryptographic attack
, Code-breaking
(More)
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to…
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
1977-2017
0
200
400
1977
2017
Related topics
Related topics
50 relations
Attack model
B-Dienst
Balanced boolean function
Baum–Welch algorithm
(More)
Related mentions per year
Related mentions per year
1956-2018
1960
1980
2000
2020
Cryptanalysis
Computer security
Block cipher
Cross-correlation
Transport Layer Security
Differential cryptanalysis
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Biclique Cryptanalysis of the Full AES
Andrey Bogdanov
,
Dmitry Khovratovich
,
Christian Rechberger
ASIACRYPT
2011
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-round attacks on the 128-bit key variant…
(More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Algebraic Cryptanalysis of the Data Encryption Standard
Nicolas Courtois
,
Gregory V. Bard
IMA Int. Conf.
2006
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the…
(More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Integral Cryptanalysis
Lars R. Knudsen
,
David A. Wagner
FSE
2002
This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential…
(More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Nicolas Courtois
,
Josef Pieprzyk
ASIACRYPT
2002
Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by…
(More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Side Channel Cryptanalysis of Product Ciphers
John Kelsey
,
Bruce Schneier
,
David A. Wagner
,
Chris Hall
ESORICS
1998
Building on the work of Kocher [Koc96], we introduce the notion of side-channel cryptanalysis: cryptanalysis using implementation…
(More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Linear Cryptanalysis Using Multiple Approximations
Burton S. Kaliski
,
Matthew J. B. Robshaw
CRYPTO
1994
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data…
(More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
The First Experimental Cryptanalysis of the Data Encryption Standard
Mitsuru Matsui
CRYPTO
1994
Linear cryptanalysis of the Fast Data Encipherment Algorithm p. 12 Differential-linear cryptanalysis p. 17 Linear cryptanalysis…
(More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Linear Cryptanalysis Method for DES Cipher
Mitsuru Matsui
EUROCRYPT
1993
We introduce a new method for cryptanalysis of DES cipher, which is essentially a known-plaintext attack. As a result, it is…
(More)
Is this relevant?
Highly Cited
1991
Highly Cited
1991
Markov Ciphers and Differential Cryptanalysis
Xuejia Lai
,
James L. Massey
,
Sean Murphy
EUROCRYPT
1991
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir…
(More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Differential cryptanalysis of DES-like cryptosystems
Eli Biham
,
Adi Shamir
Journal of Cryptology
1990
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was…
(More)
Is this relevant?