Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,662,609 papers from all fields of science
Search
Sign In
Create Free Account
Integral cryptanalysis
Known as:
Integral attack
, Square attack
, Square cryptanalysis
In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution-permutation…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Block cipher
CRYPTON
Cipher security summary
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3
Itai Dinur
,
O. Dunkelman
,
A. Shamir
IACR Cryptology ePrint Archive
2012
Corpus ID: 1963197
. On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standard. In this paper we present…
Expand
2010
2010
Algebraic Precomputations in Differential and Integral Cryptanalysis
Martin R. Albrecht
,
C. Cid
,
T. Dullien
,
J. Faugère
,
Ludovic Perret
Conference on Information Security and Cryptology
2010
Corpus ID: 16061702
Algebraic cryptanalysis is a general tool which permits one to assess the security of a wide range of cryptographic schemes…
Expand
2010
2010
Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook Koo
,
Yongjin Yeom
,
J. Song
IACR Cryptology ePrint Archive
2010
Corpus ID: 1733818
Square is an 8-round SPN structure block cipher and its round function and key schedule have been slightly modified to design…
Expand
2009
2009
Integral Cryptanalysis of ARIA
Ping Li
,
Bing Sun
,
C. Li
Conference on Information Security and Cryptology
2009
Corpus ID: 7144350
This paper studies the security of the block cipher ARIA against integral attack. The designers believe that determining whether…
Expand
Review
2003
Review
2003
Use of MRAN adaptive neural network for control of a flexible system
S. Rogers
SPIE Defense + Commercial Sensing
2003
Corpus ID: 110947805
Flexible systems are used in many industrial designs to reduce weight and power consumption. Undesirable frequencies are common…
Expand
2000
2000
Second-order analysis in polynomially perturbed reversible quadratic Hamiltonian systems
L. Gavrilov
,
I. Iliev
Ergodic Theory and Dynamical Systems
2000
Corpus ID: 14620347
We study degree $n$ polynomial perturbations of quadratic reversible Hamiltonian vector fields with one center and one saddle…
Expand
2000
2000
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2
M. Sugita
,
K. Kobara
,
K. Uehara
,
S. Kubota
,
H. Imai
AES Candidate Conference
2000
Corpus ID: 7915668
We propose a new method for evaluating the security of block ciphers against di erential cryptanalysis and propose new structures…
Expand
1994
1994
EFFICIENT ITERATIVE SOLUTION OF LINEAR SYSTEMS FROM DISCRETIZING SINGULAR INTEGRAL EQUATIONS
Ke Chen
1994
Corpus ID: 6641693
In this paper we study the solution of singular integral equations by iterative methods. We show that discretization of singular…
Expand
1992
1992
Anthology of Twentieth-Century Music
R. Morgan
1992
Corpus ID: 60332213
Since the music is characterized principally by its diversity - by the different schools and movements moving forward…
Expand
1963
1963
On a theorem of P. J. Cohen and H. Davenport
E. Hewitt
,
H. Zuckerman
1963
Corpus ID: 119397721
where the integral is the Haar integral on G, R is some positive constant not depending on G, and N is sufficiently large. For…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE