Slide attack is an attack against block ciphers which have all rounds the same. The success and the complexity of the attack is independent on the number of rounds. The original slide attack was mainly used on a Feistel structure, but very rarely on SPN networks, because in general, SPN networks have the last round diferent. This property does not allow to use normal slide attack. In the paper New slide attacks on almost self-similar ciphers by Orr Dunkelman, Nathan Keller, Noam Lasry, and Adi Shamir are introduced new slide attacks (four of them) which focus on SPN networks and they overcome a problem of the last round. In this thesis we explain main idea of the original slide attack and the main idea of two new slide attacks - a slid sets...
Abstract: This paper discusses recent attacks against summation, shrinking and self-shrinking stream...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
As a classic cryptanalytic method for block ciphers, hash functions and stream ciphers, many extensi...
Abstract. Slide attacks use pairs of encryption operations which are slid against each other. Slide ...
Abstract. Recently a powerful cryptanalytic tool|the slide attack| was introduced [3]. Slide attacks...
Slide attack is an attack against block ciphers which have all rounds the same. The success and the ...
1 Introduction Most of the modern block ciphers are constructed as a cascade of repeated keyed compo...
Abstract. In this paper we present the most important results developed in key schedule cryptanalysi...
Abstract. This paper aims to enhance the application of slide attack which is one of the most well-k...
Encryption algorithms that use the same secret key for encryption and decryption (also known as bloc...
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to...
At Crypto 2016, Kaplan et al. proposed the first quantum exponential acceleration of a classical sym...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
We compare one round diffusion characteristics of the block cipher Spectr-H64 to those of AES-Rijnda...
SQUARE is an 8-round SPN structure block cipher and its round function and key schedule have been sl...
Abstract: This paper discusses recent attacks against summation, shrinking and self-shrinking stream...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
As a classic cryptanalytic method for block ciphers, hash functions and stream ciphers, many extensi...
Abstract. Slide attacks use pairs of encryption operations which are slid against each other. Slide ...
Abstract. Recently a powerful cryptanalytic tool|the slide attack| was introduced [3]. Slide attacks...
Slide attack is an attack against block ciphers which have all rounds the same. The success and the ...
1 Introduction Most of the modern block ciphers are constructed as a cascade of repeated keyed compo...
Abstract. In this paper we present the most important results developed in key schedule cryptanalysi...
Abstract. This paper aims to enhance the application of slide attack which is one of the most well-k...
Encryption algorithms that use the same secret key for encryption and decryption (also known as bloc...
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to...
At Crypto 2016, Kaplan et al. proposed the first quantum exponential acceleration of a classical sym...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
We compare one round diffusion characteristics of the block cipher Spectr-H64 to those of AES-Rijnda...
SQUARE is an 8-round SPN structure block cipher and its round function and key schedule have been sl...
Abstract: This paper discusses recent attacks against summation, shrinking and self-shrinking stream...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
As a classic cryptanalytic method for block ciphers, hash functions and stream ciphers, many extensi...