A tutorial on linear and differential cryptanalysis

HM Heys - Cryptologia, 2002 - Taylor & Francis
In this paper, we present a detailed tutorial on linear cryptanalysis and differential
cryptanalysis, the two most significant attacks applicable to symmetric-key block ciphers. The …

Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis

K Aoki, T Ichikawa, M Kanda, M Matsui, S Moriai… - Selected Areas in …, 2001 - Springer
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size
and 128-, 192-, and 256-bit keys, ie, the same interface specifications as the Advanced …

Block ciphers and stream ciphers: The state of the art

A Biryukov - Cryptology EPrint Archive, 2004 - eprint.iacr.org
In these lecture notes we survey the state of the art in symmetric key encryption, in particular
in the block ciphers and stream ciphers area. The area of symmetric key encryption has …

Neuro-cryptanalysis of DES and triple-DES

MM Alani - … : 19th International Conference, ICONIP 2012, Doha …, 2012 - Springer
In this paper, we apply a new cryptanalytic attack on DES and Triple-DES. The implemented
attack is a known-plaintext attack based on neural networks. In this attack we trained a …

Of Ulti,'hajano', and" Matachetar otanetak datam" Exploring Local Practices of Exchanging Confidential and Sensitive Information in Urban Bangladesh

SMT Haque, P Saha, MS Rahman… - Proceedings of the ACM on …, 2019 - dl.acm.org
Strategies of hiding information over communication media have long been an interest of
CSCW and related communities. Most of the studies in this area have focused on various …

3D: A three-dimensional block cipher

J Nakahara Jr - International Conference on Cryptology and Network …, 2008 - Springer
The main contribution of this paper is a new iterated secret-key block cipher called 3D,
inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit blocks …

Research on plaintext restoration of AES based on neural network

X Hu, Y Zhao - Security and Communication Networks, 2018 - Wiley Online Library
Known plaintext attack is a common attack method in cryptographic attack. For ciphertext,
only known part of the plaintext but unknown key, how to restore the rest of the plaintext is an …

Practical Intranet Security: Overview of the State of the Art and Available Technologies

PM Ashley, M Vandenwauver - 1999 - books.google.com
Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which
an intranet can be violated and gives a thorough review of the technologies that can be used …

EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis

P Sun, F Song, Y Chen, T Chen - Proceedings of the ACM on …, 2024 - dl.acm.org
Differential cryptanalysis is a powerful algorithmic-level attack, playing a central role in
evaluating the security of symmetric cryptographic primitives. In general, the resistance …

[图书][B] Codage, cryptologie et applications

B Martin - 2004 - books.google.com
Ce livre appartient à la Collection Technique et Scientifique des Télécommunications
(CTST), publiée sous l'égide du GET (Groupe des Ecoles des Télécommunications); avec le …