Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,748,005 papers from all fields of science
Search
Sign In
Create Free Account
Integral cryptanalysis
Known as:
Integral attack
, Square attack
, Square cryptanalysis
In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution-permutation…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Block cipher
CRYPTON
Cipher security summary
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Hybrid Fuzzy Reference Signal Tracking Control of a Doubly Fed Induction Generator
N. Choug
,
S. Benaggoune
,
S. Belkacem
International Journal of Engineering
2020
Corpus ID: 218787386
This paper presents a hybrid scheme for the control of active and reactive powers using the direct vector control with stator…
Expand
2016
2016
Retos de la inclusión Académica de Personas con Discapacidad en una Universidad Pública Colombiana
F. Fernández-Morales
,
J. Duarte
2016
Corpus ID: 192907600
espanolSe presentan los resultados de un estudio que tuvo como objetivo el identificar las facilidades academicas e…
Expand
2015
2015
Abschlussbericht „Prozesskontrolle mittels Niederfeld-NMR-Spektroskopie“
M. Maiwald
,
G. Guthausen
2015
Corpus ID: 194593186
Die Online-medium-resolution-NMR-Spektroskopie wurde als neue Technik zur Uberwachung verfahrenstechnischer Prozesse…
Expand
2013
2013
Robust Stability Regions of PID Parameters for Uncertainty Systems with Time Delay Using D-partition Technique ⋆
Yifei Yang
,
Huangqiu Zhu
2013
Corpus ID: 17428793
In this paper, a method is introduced for finding gains for all proportional integral derivation (PID) controllers that satisfy a…
Expand
2012
2012
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3
Itai Dinur
,
O. Dunkelman
,
A. Shamir
IACR Cryptology ePrint Archive
2012
Corpus ID: 1963197
. On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standard. In this paper we present…
Expand
2011
2011
Adaptive image steganography based on optimal embedding and robust against chi-square attack
Omid Zanganeh
,
S. Ibrahim
2011
Corpus ID: 62597073
A real-life requirement motivated this case study of secure covert communication. Steganography is a technique used to transfer…
Expand
2009
2009
Integral Cryptanalysis of ARIA
Ping Li
,
Bing Sun
,
C. Li
Conference on Information Security and Cryptology
2009
Corpus ID: 7144350
This paper studies the security of the block cipher ARIA against integral attack. The designers believe that determining whether…
Expand
2000
2000
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2
M. Sugita
,
K. Kobara
,
K. Uehara
,
S. Kubota
,
H. Imai
AES Candidate Conference
2000
Corpus ID: 7915668
We propose a new method for evaluating the security of block ciphers against di erential cryptanalysis and propose new structures…
Expand
1992
1992
Anthology of Twentieth-Century Music
R. Morgan
1992
Corpus ID: 60332213
Since the music is characterized principally by its diversity - by the different schools and movements moving forward…
Expand
1963
1963
On a theorem of P. J. Cohen and H. Davenport
E. Hewitt
,
H. Zuckerman
1963
Corpus ID: 119397721
where the integral is the Haar integral on G, R is some positive constant not depending on G, and N is sufficiently large. For…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE