Skip to search formSkip to main contentSkip to account menu

Differential cryptanalysis

Known as: Degenerate Key, Differential attacks, T-attack 
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Abstract. In this paper, we evaluate the security of lightweight block ciphers PRESENT, Piccolo and LED against biclique… 
2011
2011
Because of high sensitivity for initial values and random-like behaviors, chaotic systems are widely used in image encryption… 
2011
2011
GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher… 
Highly Cited
2010
Highly Cited
2010
The family of WG stream ciphers has good randomness properties. In this paper, we parameterize WG-7 stream cipher for RFID tags… 
2010
2010
This paper provides new evidence regarding the information content of debt ratings. We show that noninvestment grade subordinated… 
Highly Cited
2007
Highly Cited
2007
[1] The Kyrgyz Range, located on the northern margin of the western Tian Shan, illustrates long-term (106–107 year) transient… 
2001
2001
Q is a block cipher based on Rijndael and Serpent, which was submitted as a candidate to the NESSIE project by Leslie McBride.The… 
1997
1997
In this paper we investigate the strength of the secret-key algorithm RC5 proposed by Ron Rivest. The target version of RC5 works… 
1996
1996
Cation-exchanged 12-molybdophosphates deposited on a graphite surface were imaged by scanning tunneling microscopy (STM), and… 
Highly Cited
1980
Highly Cited
1980
This paper offers a theoretical framework for studying the inter-actions of energy prices and economic growth. The incorporation…