Differential cryptanalysis

Known as: Degenerate Key, Differential attacks, T-attack 
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-key primitives. For modern… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Non-linear feedback shift registers are widely used in lightweight cryptographic primitives. For such constructions we propose a… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
1996
1996
Differential cryptanalysis was introduced as an approach to analyze the security of DES-like cryptosystems. The first example of… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1994
Highly Cited
1994
La cryptanalyse lin eaire a et e introduite l'an dernier par Matsui au congr es Eurocrypt '93. Elle ouvre des perspectives pour… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
This work is motivated by the observation that in DES-like ciphexs it is possible to choose the round functions in such a way… (More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably resistant against… (More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
A b s t r a c t I n this paper we develop the first known attack which is capable of breaking the full 16 round DES in less than… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
1991
Highly Cited
1991
This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir… (More)
Is this relevant?