Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,463 papers from all fields of science
Search
Sign In
Create Free Account
Differential cryptanalysis
Known as:
Degenerate Key
, Differential attacks
, T-attack
Expand
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Bent function
Block cipher
Boomerang attack
CIKS-1
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
Kitae Jeong
,
Hyungchul Kang
,
Changhoon Lee
,
Jaechul Sung
,
Seokhie Hong
IACR Cryptology ePrint Archive
2012
Corpus ID: 15814621
Abstract. In this paper, we evaluate the security of lightweight block ciphers PRESENT, Piccolo and LED against biclique…
Expand
2011
2011
A wheel-switch chaotic system for image encryption
Yue Wu
,
J. Noonan
,
S. Agaian
Proceedings International Conference on System…
2011
Corpus ID: 12649466
Because of high sensitivity for initial values and random-like behaviors, chaotic systems are widely used in image encryption…
Expand
2011
2011
Differential Cryptanalysis of GOST
N. Courtois
,
M. Misztal
IACR Cryptology ePrint Archive
2011
Corpus ID: 2219526
GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher…
Expand
Highly Cited
2010
Highly Cited
2010
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication
Yiyuan Luo
,
Qi Chai
,
G. Gong
,
Xuejia Lai
IEEE Global Telecommunications Conference…
2010
Corpus ID: 17689343
The family of WG stream ciphers has good randomness properties. In this paper, we parameterize WG-7 stream cipher for RFID tags…
Expand
2010
2010
The Notching Rule for Subordinated Debt and the Information Content of Debt Rating
Kose John
,
S. Ravid
,
Natalia Reisel
2010
Corpus ID: 10338110
This paper provides new evidence regarding the information content of debt ratings. We show that noninvestment grade subordinated…
Expand
Highly Cited
2007
Highly Cited
2007
Transient landscape evolution of basement‐cored uplifts: Example of the Kyrgyz Range, Tian Shan
M. Oskin
,
D. Burbank
2007
Corpus ID: 15202128
[1] The Kyrgyz Range, located on the northern margin of the western Tian Shan, illustrates long-term (106–107 year) transient…
Expand
2001
2001
Differential Cryptanalysis of Q
E. Biham
,
V. Furman
,
M. Misztal
,
V. Rijmen
Fast Software Encryption Workshop
2001
Corpus ID: 41724708
Q is a block cipher based on Rijndael and Serpent, which was submitted as a candidate to the NESSIE project by Leslie McBride.The…
Expand
1997
1997
Differential cryptanalysis of RC5
L. Knudsen
,
W. Meier
Transactions on Emerging Telecommunications…
1997
Corpus ID: 28968476
In this paper we investigate the strength of the secret-key algorithm RC5 proposed by Ron Rivest. The target version of RC5 works…
Expand
1996
1996
Ordered array formation and negative differential resistance behavior of cation-exchanged heteropoly acids probed by scanning tunneling microscopy
Mahmoud S. Kaba
,
I. Song
,
M. Barteau
1996
Corpus ID: 53318136
Cation-exchanged 12-molybdophosphates deposited on a graphite surface were imaged by scanning tunneling microscopy (STM), and…
Expand
Highly Cited
1980
Highly Cited
1980
Energy and Growth Under Flexible Exchange Rates: A Simulation Study
J. Sachs
1980
Corpus ID: 6317642
This paper offers a theoretical framework for studying the inter-actions of energy prices and economic growth. The incorporation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE