Impossible differential cryptanalysis

Known as: Impossible cryptanalysis, Miss-in-the-middle attack, Miss in the middle attack 
In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers. While ordinary differential… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Midori is a light weight block cipher recently presented by Banik et al in ASIACRYPT 2015. There are two versions of Midori with… (More)
  • table 1
  • figure 1
  • figure 2
  • table 3
Is this relevant?
2015
2015
Impossible differential is a useful method for cryptanalysis. SIMON is a light weight block cipher that has attracted lots of… (More)
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2011
2011
Since its introduction, impossible differential cryptanalysis has been applied to many ciphers. Besides the specific application… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Impossible differential cryptanalysis is a very popular tool for analyzing the security of modern block ciphers and the core of… (More)
  • table 1
Is this relevant?
2010
2010
The SMS4 is the first commercial block cipher published by Chinese government. It's a 32-round block cipher encrypted by 128-bit… (More)
  • table II
Is this relevant?
2009
2009
9-round impossible differentials of SNAKE-2 are found due to the simple linear transformation in its round function, and 10 to 12… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Block ciphers are the very foundation of computer and information security. FOX, also known as IDEA NXT, is a family of block… (More)
  • figure 1
  • figure 2
Is this relevant?
2008
2008
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007, including… (More)
  • figure 2
  • table 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossible… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2001
2001
Selected Publications: Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?