Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,198,996 papers from all fields of science
Search
Sign In
Create Free Account
Integral cryptanalysis
Known as:
Integral attack
, Square attack
, Square cryptanalysis
In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution-permutation…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Block cipher
CRYPTON
Cipher security summary
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook Koo
,
Yongjin Yeom
,
J. Song
IACR Cryptology ePrint Archive
2010
Corpus ID: 1733818
Square is an 8-round SPN structure block cipher and its round function and key schedule have been slightly modified to design…
Expand
2010
2010
Algebraic Precomputations in Differential and Integral Cryptanalysis
Martin R. Albrecht
,
C. Cid
,
T. Dullien
,
J. Faugère
,
Ludovic Perret
Conference on Information Security and Cryptology
2010
Corpus ID: 16061702
Algebraic cryptanalysis is a general tool which permits one to assess the security of a wide range of cryptographic schemes…
Expand
2009
2009
Integral Cryptanalysis of ARIA
Ping Li
,
Bing Sun
,
C. Li
Conference on Information Security and Cryptology
2009
Corpus ID: 7144350
This paper studies the security of the block cipher ARIA against integral attack. The designers believe that determining whether…
Expand
Highly Cited
2009
Highly Cited
2009
Multiparticle systems. The algebra of integrals and integrable cases
A. Borisov
,
A. Kilin
,
I. Mamaev
2009
Corpus ID: 124993491
Systems of material points interacting both with one another and with an external field are considered in Euclidean space. For…
Expand
2005
2005
Output‐feedback co‐ordinated decentralized adaptive tracking: The case of MIMO subsystems with delayed interconnections
B. Mirkin
,
P. Gutman
2005
Corpus ID: 18571399
Exact decentralized output‐feedback Lyapunov‐based designs of direct model reference adaptive control (MRAC) for linear…
Expand
Review
2003
Review
2003
Use of MRAN adaptive neural network for control of a flexible system
S. Rogers
SPIE Defense + Commercial Sensing
2003
Corpus ID: 110947805
Flexible systems are used in many industrial designs to reduce weight and power consumption. Undesirable frequencies are common…
Expand
2000
2000
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2
M. Sugita
,
K. Kobara
,
K. Uehara
,
S. Kubota
,
H. Imai
AES Candidate Conference
2000
Corpus ID: 7915668
We propose a new method for evaluating the security of block ciphers against di erential cryptanalysis and propose new structures…
Expand
2000
2000
Second-order analysis in polynomially perturbed reversible quadratic Hamiltonian systems
L. Gavrilov
,
I. Iliev
Ergodic Theory and Dynamical Systems
2000
Corpus ID: 14620347
We study degree $n$ polynomial perturbations of quadratic reversible Hamiltonian vector fields with one center and one saddle…
Expand
1989
1989
Proportional Integral Estimator
K. Kim
,
B. Shafai
,
E. Kappos
Defense, Security, and Sensing
1989
Corpus ID: 121119160
The standard Kalman filter requires that the statistical characteristics of system signal and noise are completely known. In…
Expand
1963
1963
On a theorem of P. J. Cohen and H. Davenport
E. Hewitt
,
H. Zuckerman
1963
Corpus ID: 119397721
where the integral is the Haar integral on G, R is some positive constant not depending on G, and N is sufficiently large. For…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE