As a classic cryptanalytic method for block ciphers, hash functions and stream ciphers, many extensions and refinements of differential cryptanalysis have been developed. In this paper, we focus on the use of so-called structures in differential attacks, i.e. the use of multiple input and one output difference. We give a general model and complexity analysis for structure attacks and show how to choose the set of differentials to minimize the time and data complexities. Being a subclass of multiple differential attacks in general, structure attacks can also be analyzed in the model of Blondeau et al. from FSE 2011. In this very general model, a restrictive condition on the set of input differences is required for the complexity analysis. We...
We introduce commutative diagram cryptanalysis, a framework for expressing certain kinds of attacks...
In 2004, Biryukov et al. presented a new theoretical framework for the linear cryptanalysis of block...
This paper considers the security of iterated block ciphers against the differential cryptanalysis i...
Abstract. A differential attack tries to capture the round keys corre-sponding to the S-boxes activa...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differe...
Abstract: At the beginning of the paper we give an overview of linear and differential cryptanalysis...
International audienceWe present a framework that unifies several standard differ-ential techniques....
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against ...
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against ...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
We propose a differential attack on tree-structured substitution-permutation networks. The number of...
Block ciphers and their security are the main subjects of this work. In the first part it is descr...
Abstract. The mere number of various apparently different statistical attacks on block ciphers has r...
Differential factors, which prevent the attacker to distinguish some of the guessed keys correspondi...
We introduce commutative diagram cryptanalysis, a framework for expressing certain kinds of attacks...
In 2004, Biryukov et al. presented a new theoretical framework for the linear cryptanalysis of block...
This paper considers the security of iterated block ciphers against the differential cryptanalysis i...
Abstract. A differential attack tries to capture the round keys corre-sponding to the S-boxes activa...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differe...
Abstract: At the beginning of the paper we give an overview of linear and differential cryptanalysis...
International audienceWe present a framework that unifies several standard differ-ential techniques....
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against ...
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against ...
Abstract. Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysi...
We propose a differential attack on tree-structured substitution-permutation networks. The number of...
Block ciphers and their security are the main subjects of this work. In the first part it is descr...
Abstract. The mere number of various apparently different statistical attacks on block ciphers has r...
Differential factors, which prevent the attacker to distinguish some of the guessed keys correspondi...
We introduce commutative diagram cryptanalysis, a framework for expressing certain kinds of attacks...
In 2004, Biryukov et al. presented a new theoretical framework for the linear cryptanalysis of block...
This paper considers the security of iterated block ciphers against the differential cryptanalysis i...