Have a personal or library account? Click to login
Towards Provable Security of Rijndael-Like Spn Ciphers Against Differential Attacks Cover

Towards Provable Security of Rijndael-Like Spn Ciphers Against Differential Attacks

Open Access
|Feb 2013

References

  1. [1] DAEMEN, J.-RIJMEN, V.: AES proposal Rijndael, AES Round 1 Technical Evaluation CD1: Documentation, National Institute of Standards and Technology, 1998, http://www.nist.gov/aes.
  2. [2] SUGITA, M.-KOBARA, K.-UEHARA, K.-KUBOTA, S.-IMAI, H.: Relationshipsamong differential, truncated differential, impossible differential cryptanalyses againstword-oriented block cipher like Rijndael, E2, in: Proc. of the 3rd AES Candidate Conference, New York, USA, 2000, National Institute of Standards and Technology, 2000, pp. 242-254, http://www.nist.gov/aes.
  3. [3] SUGITA, M.-KOBARA, K.-IMAI, H.: Pseudorandomness and maximum average ofdifferential probability of block ciphers with SPN-structures like E2, in: Proc. of the 2nd AES Candidate Conference, AES Workshop, Rome, Italy, 1999, pp. 200-214.
  4. [4] KNUDSEN, L. R.: Truncated and higher order differentials, in: Fast Software Encryption-FSE ’95, 2nd Internat. Workshop (B. Preneel, ed.), Leuven, 1995, Lecture Notes in Comput. Sci., Vol. 1008, Springer-Verlag, Berlin, 1995, pp. 196-211.
  5. [5] KNUDSEN, L. R.-BERSON, T. A.: Truncated differentials of SAFER, in: Fast Software Encryption-FSE ’96, 3rd Internat. Workshop (D. Gollmann, ed.), Cambridge, UK, Lecture Notes in Comput. Sci., Vol. 1039, Springer-Verlag, Berlin, 1996, pp. 15-25.
  6. [6] MATSUI, M.-TOKITA, T.: Cryptanalysis of reduced version of the block cipher E2, Fast Software Encryption-FSE ’99, 6th Internat. Workshop (L. Knudsen, ed.), Lecture Notes in Comput. Sci., Vol. 1636, Springer-Verlag, Berlin, 1999, pp. 71-80.
  7. [7] RUZHENTSEV, V. I.: About methods of an estimation of resistance to truncated differentialsattack, Radioelektronika i informatika 4 (2003), 130-133. (In Russian)
  8. [8] MORIAI, S.-SUGITA, M.-AOKI, K.: Security of E2 against truncated differentialcryptanalysis, in: Selected Areas in Cryptography-SAC ’99, 6th Annual Internat. Workshop (H. Heys, C. Adams, eds.), Lecture Notes in Comput. Sci., Vol. 1758, Springer-Verlag, Berlin, 2000, pp. 106-117.
  9. [9] DOLGOV, V. I.-RUZHENTSEV, V. I.: About the method of evaluation the resistance ofcipher Rijndael to differential attacks, Radioelektronika i informatika 1 (2002), 136-138. (In Russian)
DOI: https://doi.org/10.2478/v10127-012-0046-4 | Journal eISSN: 1338-9750 | Journal ISSN: 12103195
Language: English
Page range: 189 - 199
Published on: Feb 1, 2013
Published by: Slovak Academy of Sciences, Mathematical Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2013 Victor Ruzhentsev, Victor Dolgov, published by Slovak Academy of Sciences, Mathematical Institute
This work is licensed under the Creative Commons License.