PP-1 is a scalable block cipher which can be implemented on a platform with limited resource. In this paper, we analyze the security of PP-1 by using truncated differential cryptanalysis. As concrete examples, we consider four versions of PP-1, PP-1/64, PP-1/128, PP-1/192, and PP-1/256. Our attack is applicable to full-round versions of them, respectively. The proposed attacks can recover a secret key of PP-1 with the computational complexity which is faster than the exhaustive search. These are the first known cryptanalytic results on PP-1
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Symmetric block ciphers are among the most widely used cryptographic primitives. In addition to prov...
A totally involutional, highly scalable PP-1 cipher is proposed, evaluated and discussed. Having ver...
In this paper we present a differential attack on the block cipher PP-1 which was designed at Poznan...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
Most of today’s cryptographic primitives are based on computations that are hard to perform for a po...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
CS-Cipher is a block cipher which has been proposed at FSE 1998. It is a Markov cipher in which diff...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
Abstract. Design of SP networks in which the non-linear layer is applied to only a part of the state...
We propose a differential attack on tree-structured substitution-permutation networks. The number of...
Modern cryptographic algorithms play an irreplaceable role in data communication systems for various...
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Symmetric block ciphers are among the most widely used cryptographic primitives. In addition to prov...
A totally involutional, highly scalable PP-1 cipher is proposed, evaluated and discussed. Having ver...
In this paper we present a differential attack on the block cipher PP-1 which was designed at Poznan...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
Most of today’s cryptographic primitives are based on computations that are hard to perform for a po...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
CS-Cipher is a block cipher which has been proposed at FSE 1998. It is a Markov cipher in which diff...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
Abstract. Design of SP networks in which the non-linear layer is applied to only a part of the state...
We propose a differential attack on tree-structured substitution-permutation networks. The number of...
Modern cryptographic algorithms play an irreplaceable role in data communication systems for various...
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Symmetric block ciphers are among the most widely used cryptographic primitives. In addition to prov...