Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
The design of substitution-permutation networks resistant to differential and linear cryptanalysis
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A Known Plaintext Attack of FEAL-4 and FEAL-6
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Iterative Characteristics of DES and s²-DES
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Differential Attack on Message Authentication Codes
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Differtial Cryptanalysis of Lucifer
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Computing Differential Properties of Addition
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Differential cryptanalysis mod 232 with applications to MD5
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
On CCZ-equivalence of addition mod 2n
Designs, Codes and Cryptography
Hi-index | 0.00 |
In [1,2] we introduced the notion of differential cryptanalysis and described its application to DES[8] and several of its variants. In this paper we show the applicability of differential cryptanalysis to the Feal family of encryption algorithms and to the N-Hash hash function.