Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
Linear Frameworks for Block Ciphers
Designs, Codes and Cryptography
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of Reduced-Round MISTY
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Structural Cryptanalysis of SASAS
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
Fast Software Encryption, Cambridge Security Workshop
Proceedings of the Third International Workshop on Fast Software Encryption
Truncated Differentials of SAFER
Proceedings of the Third International Workshop on Fast Software Encryption
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
New Block Encryption Algorithm MISTY
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
The Interpolation Attack on Block Ciphers
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Attack on Six Rounds of Crypton
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Improved Cryptanalysis of Rijndael
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
The Saturation Attack - A Bait for Twofish
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Square Attack on Reduced Camellia Cipher
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Square-like Attacks on Reduced Rounds of IDEA
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Security of a Wide Trail Design
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Framework for Describing Block Cipher Cryptanalysis
IEEE Transactions on Computers
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks
Computer Standards & Interfaces
On the design of error-correcting ciphers
EURASIP Journal on Wireless Communications and Networking
Impossible differential cryptanalysis of reduced-round ARIA and Camellia
Journal of Computer Science and Technology
Differential fault analysis on the ARIA algorithm
Information Sciences: an International Journal
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Bit-Pattern Based Integral Attack
Fast Software Encryption
Analysis of Two Attacks on Reduced-Round Versions of the SMS4
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
An Improved Impossible Differential Attack on MISTY1
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
On Generalized Feistel Structures Using the Diffusion Switching Mechanism
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Higher Order Differential Attacks on Reduced-Round MISTY1
Information Security and Cryptology --- ICISC 2008
A Statistical Saturation Attack against the Block Cipher PRESENT
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Saturation Attack on the Block Cipher HIGHT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
An optimized algebraic method for higher order differential attack
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Analysis of the SMS4 block cipher
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Known-key distinguishers for some block ciphers
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Attacking reduced-round versions of the SMS4 block cipher in the Chinese WAPI standard
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Square attack on reduced-round Zodiac cipher
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Improving integral attacks against Rijndael-256 up to 9 rounds
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Generic attacks on misty schemes
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Cryptanalysis of a generalized unbalanced feistel network structure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Integral cryptanalysis of ARIA
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Zero-sum distinguishers for iterated permutations and application to KECCAK-f and Hamsi-256
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
A meet-in-the-middle attack on reduced-round ARIA
Journal of Systems and Software
LBlock: a lightweight block cipher
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Improved security analysis of Fugue-256
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Linear cryptanalysis of ARIA block cipher
ICICS'11 Proceedings of the 13th international conference on Information and communications security
FOX: a new family of block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Amplifying side-channel attacks with techniques from block cipher cryptanalysis
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
New multiset attacks on rijndael with large blocks
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
A fast calculus for the linearizing attack and its application to an attack on KASUMI
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
New combined attacks on block ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Integral attacks on reduced-round ARIA block cipher
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Bitwise higher order differential cryptanalysis
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Integral cryptanalysis of reduced FOX block cipher
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Improved integral attacks on reduced-round CLEFIA block cipher
WISA'11 Proceedings of the 12th international conference on Information Security Applications
KLEIN: a new family of lightweight block ciphers
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
EPCBC: a block cipher suitable for electronic product code encryption
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Linear fault analysis of block ciphers
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Weak-Key class of MISTY1 for related-key differential attack
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Cryptanalysis of reduced-round KLEIN block cipher
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Integral and multidimensional linear distinguishers with correlation zero
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Comprehensive study of integral analysis on 22-round LBlock
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Block ciphers that are easier to mask: how far can we go?
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.01 |
This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential attacks. The method is particularlyapplicable to block ciphers which use bijective components only.