Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,702 papers from all fields of science
Search
Sign In
Create Free Account
Differential cryptanalysis
Known as:
Degenerate Key
, Differential attacks
, T-attack
Expand
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Bent function
Block cipher
Boomerang attack
CIKS-1
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Differential Cryptanalysis of Round-Reduced Simon and Speck
F. Abed
,
Eik List
,
S. Lucks
,
Jakob Wenzel
Fast Software Encryption Workshop
2014
Corpus ID: 43915551
This paper presents differential attacks on Simon and Speck, two families of lightweight block ciphers that were presented by the…
Expand
Highly Cited
2012
Highly Cited
2012
A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system
Xiaopeng Wei
,
Ling Guo
,
Qiang Zhang
,
Jianxin Zhang
,
Shiguo Lian
Journal of Systems and Software
2012
Corpus ID: 31252181
Highly Cited
2010
Highly Cited
2010
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
Simon Knellwolf
,
W. Meier
,
M. Naya-Plasencia
International Conference on the Theory and…
2010
Corpus ID: 13454894
Non-linear feedback shift registers are widely used in lightweight cryptographic primitives. For such constructions we propose a…
Expand
Highly Cited
2010
Highly Cited
2010
Image encryption using DNA addition combining with chaotic maps
Qiang Zhang
,
Ling Guo
,
Xiaopeng Wei
Mathematical and computer modelling
2010
Corpus ID: 206828083
Highly Cited
2009
Highly Cited
2009
Algebraic Techniques in Differential Cryptanalysis
Martin R. Albrecht
,
C. Cid
IACR Cryptology ePrint Archive
2009
Corpus ID: 13862127
In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical…
Expand
Highly Cited
2008
Highly Cited
2008
On Probability of Success in Linear and Differential Cryptanalysis
A. Selçuk
Journal of Cryptology
2008
Corpus ID: 5259551
Abstract Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust…
Expand
Highly Cited
2007
Highly Cited
2007
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
B. Wyseur
,
Wil Michiels
,
Paul Gorissen
,
B. Preneel
IACR Cryptology ePrint Archive
2007
Corpus ID: 6455580
At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the…
Expand
Highly Cited
2002
Highly Cited
2002
Enhancing Differential-Linear Cryptanalysis
E. Biham
,
O. Dunkelman
,
Nathan Keller
International Conference on the Theory and…
2002
Corpus ID: 15828260
Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is…
Expand
Highly Cited
2001
Highly Cited
2001
Chaos and cryptography: block encryption ciphers based on chaotic maps
G. Jakimoski
,
L. Kocarev
2001
Corpus ID: 1424006
This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several…
Expand
Highly Cited
1995
Highly Cited
1995
Female canaries are sexually responsive to special song phrases
E. Vallet
,
M. Kreutzer
Animal Behaviour
1995
Corpus ID: 53157584
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE