Two-Round AES Differentials (original) (raw)
Related papers
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
Computing, 2009
On the Four-Round AES Characteristics
2013
New Impossible Differential Attacks on AES
2008
Provable Security Against Differential Cryptanalysis
Lecture Notes in Computer Science, 1993
Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials
Faster Chosen-Key Distinguishers on Reduced-Round AES
Lecture Notes in Computer Science, 2012
Complementation-Like and Cyclic Properties of AES Round Functions
Lecture Notes in Computer Science, 2005
Differential analysis of Round-Reduced AES faulty ciphertexts
2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), 2013
Differential Analysis of the LED Block Cipher
Lecture Notes in Computer Science, 2012
New impossible differential attacks on reduced-round Crypton
2010
Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers
Tatra Mountains Mathematical Publications
Improved Top-Down Techniques in Differential Cryptanalysis
Lecture Notes in Computer Science, 2015
A differential attack on the CIKS-1 block cipher
2004
A unified method for finding impossible differentials of block cipher structures
Information Sciences, 2014
IACR Cryptol. ePrint Arch., 2015
An Improved Truncated Differential Cryptanalysis of Klein
Tatra Mountains Mathematical Publications, 2016
Towards a Combined Rotational-Differential Cryptanalytic Framework
Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon
Proceedings of the 11th International Conference on Security and Cryptography, 2014
Differential and linear cryptanalysis for 2-round SPNs
Information Processing Letters, 2003
Designs, Codes and Cryptography
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
2002
Probability distributions of correlation and differentials in block ciphers
Journal of Mathematical Cryptology, 2000
Further observations on the structure of the AES algorithm
2003
Related-Key Differential Attack on Round-Reduced Bel-T-256
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2018
A Meet-in-the-Middle Attack on 8-Round AES
Fast Software Encryption
Differential Power Analysis in AES: A Crypto Anatomy
International Journal of Engineering and Industries, 2011
Differential fault analysis of AES: towards reaching its limits
Journal of Cryptographic Engineering, 2012
Des-Like Ciphers, Differential Attacks and Apn Functions
Journal of Mathematical Sciences: Advances and Applications, 2018
Differential Cryptanalysis of DES-like Cryptosystems
1990
Differential attack on nine rounds of the SEED block cipher
Information Processing Letters, 2014
Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128
Lecture Notes in Computer Science, 2016
Security analysis of SIMECK block cipher against related-key impossible differential
Information Processing Letters, 2019
Advanced truncated differential cryptanalysis of GOST block cipher
2014
Impossible differential and square attacks: Cryptanalytic link and application to Skipjack
Improved Impossible Differential Attacks on Large-Block Rijndael
Lecture Notes in Computer Science, 2013