Cryptanalysis

Known as: Cryptoanalyst, Cryptographic attack, Code-breaking 
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1977-2017
020040019772017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-round attacks on the 128-bit key variant… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the… (More)
  • table 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Building on the work of Kocher [Koc96], we introduce the notion of side-channel cryptanalysis: cryptanalysis using implementation… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Linear cryptanalysis of the Fast Data Encipherment Algorithm p. 12 Differential-linear cryptanalysis p. 17 Linear cryptanalysis… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
We introduce a new method for cryptanalysis of DES cipher, which is essentially a known-plaintext attack. As a result, it is… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
1991
Highly Cited
1991
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
1990
Highly Cited
1990
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?