Abstract Impossible Differential Cryptanalysis (IDC)[4] uses impossible differential characteristics to retrieve a subkey material for the first or the last several rounds of block …
Y Luo, X Lai, Z Wu, G Gong - Information Sciences, 2014 - Elsevier
In this paper, we propose a systematic method for finding impossible differentials for block cipher structures, which we call the unified impossible differential finding method or UID …
J Kim, S Hong, J Lim - Discrete Mathematics, 2010 - Elsevier
The general strategy of impossible differential cryptanalysis is to first find impossible differentials and then exploit them for retrieving subkey material from the outer rounds of …
A Bogdanov, K Shibutani - Designs, codes and cryptography, 2013 - Springer
This work deals with the classification, security and efficiency of generalized Feistel networks (GFNs) with 4 lines. We propose a definition of a GFN, essentially limiting …
KD Muthavhine, M Sumbwanyambe - IEEE Access, 2024 - ieeexplore.ieee.org
The Skipjack algorithm is used by many Internet of Things (IoT) devices to secure and encrypt data. Skipjack-encrypted data has been discovered to be vulnerable to Differential …
Untitled Page 1 Page 2 Information Security and Cryptography Texts and Monographs Series Editor Ueli Maurer Associate Editors Martin Abadi Ross Anderson Mihir Bellare …
Y Luo, X Lai - Security and Communication Networks, 2017 - Wiley Online Library
We improve Wu and Wang's method for finding impossible differentials of block cipher structures. This improvement is more general than Wu and Wang's method where it can find …
J Choy, H Yap - International Workshop on Security, 2009 - Springer
Abstract Impossible boomerang attack [5](IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible …
R Guo, C Jin - Etri Journal, 2014 - Wiley Online Library
The Lai‐Massey scheme, proposed by Vaudenay, is a modified structure in the International Data Encryption Algorithm cipher. A family of block ciphers, named FOX, were built on the …