Author:
Biham Eli,Dunkelman Orr,Keller Nathan
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Anderson, R., Biham, E., Knudsen, L.R.: Serpent: A Proposal for the Advanced Encryption Standard, NIST AES Proposal (1998)
2. Lecture Notes in Computer Science;E. Biham,1995
3. Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)
4. Lecture Notes in Computer Science;E. Biham,2001
5. Lecture Notes in Computer Science;E. Biham,2002
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing;Lecture Notes in Computer Science;2024
2. Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT;Lecture Notes in Computer Science;2024
3. Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning;Advances in Cryptology – ASIACRYPT 2022;2022
4. New Attacks from Old Distinguishers Improved Attacks on Serpent;Topics in Cryptology – CT-RSA 2022;2022
5. Differential-Linear Cryptanalysis from an Algebraic Perspective;Advances in Cryptology – CRYPTO 2021;2021