Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
On the distribution of characteristics in composite permutations
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Fast Software Encryption Functions
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Proceedings of the Third International Workshop on Fast Software Encryption
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
On the iterative construction of bent functions
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
An algorithm based mesh check-sum fault tolerant scheme for stream ciphers
International Journal of Communication Networks and Distributed Systems
A mesh check-sum ABFT scheme for stream ciphers
International Journal of Communication Networks and Distributed Systems
Cryptanalysis of the stream cipher ABC v2
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Notions and relations for RKA-secure permutation and function families
Designs, Codes and Cryptography
Hi-index | 0.00 |
Key-dependent S-boxes gained some prominence in block cipher design when Twofish became an AES finalist. In this paper we make some observations on how the cryptanalyst might work with key-dependent S-boxes, we begin to develop a framework for the differential cryptanalysis of key-dependent S-boxes, and we introduce some basic techniques that were used in an analysis of reduced-round Twofish.