Analysis and design of stream ciphers
Analysis and design of stream ciphers
A proposal for a new block encryption standard
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On the security of the IDEA block cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
The First Experimental Cryptanalysis of the Data Encryption Standard
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Differential-Linear Cryptanalysis
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Differential Cryptanalysis of Reduced Rounds of GOST
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Square-like Attacks on Reduced Rounds of IDEA
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Enhancing Differential-Linear Cryptanalysis
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
On the Design and Security of RC2
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Miss in the Middle Attacks on IDEA and Khufu
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
On the Decorrelated Fast Cipher (DFC) and Its Theory
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
IDEA: A Cipher For Multimedia Architectures?
SAC '98 Proceedings of the Selected Areas in Cryptography
A Unified Approach to Related-Key Attacks
Fast Software Encryption
The Key-Dependent Attack on Block Ciphers
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Improved DST Cryptanalysis of IDEA
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Differential-multiple linear cryptanalysis
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
New cryptanalytic results on IDEA
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
New combined attacks on block ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
New attacks against reduced-round versions of IDEA
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Related-Key boomerang and rectangle attacks
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Zero correlation linear cryptanalysis with reduced data complexity
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Generalized Feistel networks revisited
Designs, Codes and Cryptography
Integral and multidimensional linear distinguishers with correlation zero
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Collisions for the WIDEA-8 compression function
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Improved impossible differential attacks on large-block rijndael
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Differential entropy analysis of the IDEA block cipher
Journal of Computational and Applied Mathematics
Linear hulls with correlation zero and linear cryptanalysis of block ciphers
Designs, Codes and Cryptography
Hi-index | 0.00 |
In 1991 Lai, Massey and Murphy introduced the IPES (Improved Proposed Encryption Standard), later renamed IDEA (International Data Encryption Algorithm). In this paper we give two new attacks on a reduced number of rounds of IDEA. A truncated differential attack on IDEA reduced to 3.5 rounds and a differential-linear attack on IDEA reduced to 3 rounds. The truncated differential attack contains a novel method for determining the secret key.