Chaos-based cryptography: a brief overview

L Kocarev - IEEE Circuits and Systems Magazine, 2001 - ieeexplore.ieee.org
Over the past decade, there has been tremendous interest in studying the behavior of
chaotic systems. They are characterized by sensitive dependence on initial conditions …

A tutorial on linear and differential cryptanalysis

HM Heys - Cryptologia, 2002 - Taylor & Francis
In this paper, we present a detailed tutorial on linear cryptanalysis and differential
cryptanalysis, the two most significant attacks applicable to symmetric-key block ciphers. The …

Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block …

S Sun, L Hu, P Wang, K Qiao, X Ma, L Song - Advances in Cryptology …, 2014 - Springer
We propose two systematic methods to describe the differential property of an S-box with
linear inequalities based on logical condition modelling and computational geometry …

Improving attacks on round-reduced speck32/64 using deep learning

A Gohr - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
This paper has four main contributions. First, we calculate the predicted difference
distribution of Speck32/64 with one specific input difference under the Markov assumption …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

[图书][B] Cryptography engineering: design principles and practical applications

N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …

PRESENT: An ultra-lightweight block cipher

A Bogdanov, LR Knudsen, G Leander, C Paar… - … and Embedded Systems …, 2007 - Springer
With the establishment of the AES the need for new block ciphers has been greatly
diminished; for almost all block cipher applications the AES is an excellent and preferred …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Differential fault analysis of secret key cryptosystems

E Biham, A Shamir - Advances in Cryptology—CRYPTO'97: 17th Annual …, 1997 - Springer
Abstract In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new
type of cryptanalytic attack which exploits computational errors to find cryptographic keys …