Truncated differential cryptanalysis

Known as: Truncated differential 
In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack against block ciphers. Lars… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1996-2018
051019962018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
We study applications of BV algorithm and present quantum versions of impossible differential cryptanalysis and truncated… (More)
Is this relevant?
2017
2017
Statistical analyzes of multiple (truncated) differential attacks are considered in this paper. Following the work of Blondeau… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2015
2015
PRINCE is a lightweight block cipher whose block size and key size are 64-bit and 128-bit, respectively. The core component of… (More)
  • table I
  • figure 1
  • table II
  • table III
  • figure 2
Is this relevant?
2015
2015
The decorrelation theory provides a different point of view on the security of block cipher primitives. Results on some… (More)
Is this relevant?
2015
2015
Differential Cryptanalysis (DC) is one of the oldest and most powerful techniques in the area of symmetric cryptanalysis. It is a… (More)
Is this relevant?
2014
2014
Recently, two families of ultra-lightweight block ciphers were proposed, SIMON and SPECK, which come in a variety of block and… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2013
2013
GOST is a well-known block cipher implemented in standard libraries such as OpenSSL, it has extremely low implementation cost and… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2005
2005
We present an attack on Salsa20 reduced to five of its twenty rounds. This attack uses many clusters of truncated differentials… (More)
Is this relevant?
2001
2001
Camellia is a block cipher cooperatively designed by NTT and Mitsubshi Electric Corporation and submitted to NESSIE. In this… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
1999
1999
  • Ntt Laboratories
  • 1999
This paper studies the security offered by E2 against truncated differential attack. At FSE'99, Matsui and Tokita presented a… (More)
  • figure 1
  • figure 2
Is this relevant?