Accès libre

LOW DATA COMPLEXITY DIFFERENTIAL - ALGEBRAIC ATTACK ON REDUCED ROUND DES

À propos de cet article

Citez

[1]ALBRECHT. M.-CID, C.: Algebraic techniques in differential cryptanalysis, IACR Cryptology ePrint Archive, Report 2008/177. 10.1007/978-3-642-03317-9_12Search in Google Scholar

[2]GASECKI. A.- MISZTAL, M.: Application of algebraic techniques in differential crypt- analysis aganst block cipher DES, MUT Bulletin, Warsaw, 2011.Search in Google Scholar

[3]BIHAM, E.-SHAMIR, A.: Differential cryptanalysis of DES-like cryptosystems, in: Ad- vances in Cryptology-CRYPTO '90 (A. Menezes et al., eds.), Santa Barbara, USA, 1990, Lecture Notes in Comput. Sci., Vol. 537, Springer-Verlag, Berlin, 1990, pp. 2-21.10.1007/3-540-38424-3_1Search in Google Scholar

[4]NATIANAL INSTITUTE OF STANDARDS AND TECHNOLOGY: Data Encryption Standard, FIPS PUB 46-3, 1999.Search in Google Scholar

[5]COURTOIS, N. T.-BARD, G. V.: Algebraic cryptanalysis of the data encryption stan- dard. IACR Cryptology ePrint Archive, Report 2006/402. Search in Google Scholar

[6] COURTOIS, N. T.: Examples of equations generated for experiments with algebraic crypt- analysis of DES, <http://www.cryptosystem.net/aes/toyciphers.html>.Search in Google Scholar

[7]FAUGERE, .J.-C.-PERRET, L- SPAENLEHAUER, P.-.J.: Algebraic-differential crypt- analysis of DES. in: Western European Workshop on Research in Crypt.-WEWoRC ’09 (C. Rechberger, ed.), Graz, Austria, 2009, Lecture Notes in Comput. Sci., Vol. 6429, Springer-Verlag, Berlin, 2009, pp. 1-5.Search in Google Scholar

[8]KNUDSEN, L. R.: Truncated and higher order differentials, in: Fast Software Encryp- tion, 2nd Internat. Workshop (B. Preneel, ed.), Leuven, Belgium, 1994, Lecture Notes in Comput. Sci., Vol. 1008, Springer-Verlag, Berlin, 1995, pp. 196-211. Search in Google Scholar

[9]MATSUI, M.: Linear cryptanalysis method for DES cipher, in: Advances in Cryptology- -Eurocrypt ’93 (T. Helleseth, ed.). Lofthus, Norway. 1993. Lecture Notes in Comput. Sci.. Vol. 765. Springer-Verlag, Berlin, 1993, pp. 386-397.Search in Google Scholar

[10]COURTOIS, N. T.-GAVYINECKI, A.-SONG, G.: Contradiction immunity and guess- then-determine attacks on GOST. Tatra Mt. Math. Publ. 53 (2012), 65-79.Search in Google Scholar

[11]BIHAM, E.-SHAMIR, A.: Differential cryptanalysis of the full 16-rou.nd DES. in: Ad- vances in Cryptology-CRYPTO ’92 (E. Brickell, ed.), 12th Annual Internat. Cryptology Conf., Santa Barbara, CA, USA, 1992, Lecture Notes in Comput. Sci., Vol. 740, Springer, Berlin, 1993, pp. 487-496. Search in Google Scholar

ISSN:
1210-3195
Langue:
Anglais
Périodicité:
3 fois par an
Sujets de la revue:
Mathematics, General Mathematics