Malyshev, F. M. The duality of differential and linear methods in cryptography. (Russian. English summary) Zbl 1475.94134 Mat. Vopr. Kriptografii 5, No. 3, 35-47 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{F. M. Malyshev}, Mat. Vopr. Kriptografii 5, No. 3, 35--47 (2014; Zbl 1475.94134) Full Text: DOI MNR
Dobraunig, Christoph; Mendel, Florian; Schläffer, Martin Differential cryptanalysis of SipHash. (English) Zbl 1382.94097 Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 165-182 (2014). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Dobraunig} et al., Lect. Notes Comput. Sci. 8781, 165--182 (2014; Zbl 1382.94097) Full Text: DOI
Dinur, Itai Improved differential cryptanalysis of round-reduced Speck. (English) Zbl 1382.94089 Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 147-164 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Dinur}, Lect. Notes Comput. Sci. 8781, 147--164 (2014; Zbl 1382.94089) Full Text: DOI
Luo, Yiyuan; Lai, Xuejia; Wu, Zhongming; Gong, Guang A unified method for finding impossible differentials of block cipher structures. (English) Zbl 1345.94078 Inf. Sci. 263, 211-220 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Luo} et al., Inf. Sci. 263, 211--220 (2014; Zbl 1345.94078) Full Text: DOI
Zhao, Guangyao; Cheng, Lei; Li, Chao; Li, Ruilin; Shen, Xuan On the practical security bound of GF-NLFSR structure with SPN round function. (English) Zbl 1368.94141 Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 40-54 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Zhao} et al., Lect. Notes Comput. Sci. 8782, 40--54 (2014; Zbl 1368.94141) Full Text: DOI
Leurent, Gaëtan Cryptanalysis of Widea. (English) Zbl 1321.94073 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 39-51 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Leurent}, Lect. Notes Comput. Sci. 8424, 39--51 (2014; Zbl 1321.94073) Full Text: DOI
Horadam, Kathy J.; Villanueva, Mercé Relationships between CCZ and EA equivalence classes and corresponding code invariants. (English) Zbl 1337.94107 Schmidt, Kai-Uwe (ed.) et al., Sequences and their applications – SETA 2014. 8th international conference, Melbourne, VIC, Australia, November 24–28, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12324-0/pbk; 978-3-319-12325-7/ebook). Lecture Notes in Computer Science 8865, 3-17 (2014). MSC: 94B25 94A60 PDFBibTeX XMLCite \textit{K. J. Horadam} and \textit{M. Villanueva}, Lect. Notes Comput. Sci. 8865, 3--17 (2014; Zbl 1337.94107) Full Text: DOI Link
Biryukov, Alex; Nakahara, Jorge jun.; Yıldırım, Hamdi Murat Differential entropy analysis of the IDEA block cipher. (English) Zbl 1338.94065 J. Comput. Appl. Math. 259, Part B, 561-570 (2014). MSC: 94A60 94A17 PDFBibTeX XMLCite \textit{A. Biryukov} et al., J. Comput. Appl. Math. 259, Part B, 561--570 (2014; Zbl 1338.94065) Full Text: DOI
Tezcan, Cihangir Improbable differential attacks on PRESENT using undisturbed bits. (English) Zbl 1354.94048 J. Comput. Appl. Math. 259, Part B, 503-511 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Tezcan}, J. Comput. Appl. Math. 259, Part B, 503--511 (2014; Zbl 1354.94048) Full Text: DOI
Kaidalov, Dmytro; Oliynykov, Roman; Kazymyrov, Oleksandr A method for security estimation of the SPN-based block cipher against related-key attacks. (English) Zbl 1395.94292 Tatra Mt. Math. Publ. 60, 25-45 (2014). Reviewer: Viliam Hromada (Bratislava) MSC: 94A60 PDFBibTeX XMLCite \textit{D. Kaidalov} et al., Tatra Mt. Math. Publ. 60, 25--45 (2014; Zbl 1395.94292) Full Text: DOI
Sun, Siwei; Hu, Lei; Wang, Peng; Qiao, Kexin; Ma, Xiaoshuang; Song, Ling Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers. (English) Zbl 1306.94093 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 158-178 (2014). MSC: 94A60 90C11 PDFBibTeX XMLCite \textit{S. Sun} et al., Lect. Notes Comput. Sci. 8873, 158--178 (2014; Zbl 1306.94093) Full Text: DOI
Yin, Huilin; Yang, Xiaohan Linear regression analysis for leakage model of differential side channel cryptanalysis. (Chinese. English summary) Zbl 1313.94053 J. Tongji Univ., Nat. Sci. 42, No. 2, 315-319 (2014). MSC: 94A60 94A40 62J05 PDFBibTeX XMLCite \textit{H. Yin} and \textit{X. Yang}, J. Tongji Univ., Nat. Sci. 42, No. 2, 315--319 (2014; Zbl 1313.94053)
Shibutani, Kyoji; Bogdanov, Andrey Towards the optimality of Feistel ciphers with substitution-permutation functions. (English) Zbl 1310.94168 Des. Codes Cryptography 73, No. 2, 667-682 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Shibutani} and \textit{A. Bogdanov}, Des. Codes Cryptography 73, No. 2, 667--682 (2014; Zbl 1310.94168) Full Text: DOI
Banik, Subhadeep Some insights into differential cryptanalysis of Grain v1. (English) Zbl 1318.94062 Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 34-49 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Banik}, Lect. Notes Comput. Sci. 8544, 34--49 (2014; Zbl 1318.94062) Full Text: DOI
Taga, Bungo; Moriai, Shiho; Aoki, Kazumaro Differential and impossible differential related-key attacks on Hierocrypt-L1. (English) Zbl 1318.94082 Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 17-33 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Taga} et al., Lect. Notes Comput. Sci. 8544, 17--33 (2014; Zbl 1318.94082) Full Text: DOI
Wang, Yanfeng; Wu, Wenling; Guo, Zhiyuan; Yu, Xiaoli Differential cryptanalysis and linear distinguisher of full-round zorro. (English) Zbl 1353.94077 Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 308-323 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Wang} et al., Lect. Notes Comput. Sci. 8479, 308--323 (2014; Zbl 1353.94077) Full Text: DOI
Blondeau, Céline; Nyberg, Kaisa Links between truncated differential and multidimensional linear properties of block ciphers and underlying attack complexities. (English) Zbl 1332.94060 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 165-182 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Blondeau} and \textit{K. Nyberg}, Lect. Notes Comput. Sci. 8441, 165--182 (2014; Zbl 1332.94060) Full Text: DOI
Shakiba, Mohsen; Dakhilalian, Mohammad; Mala, Hamid On computational complexity of impossible differential cryptanalysis. (English) Zbl 1371.94655 Inf. Process. Lett. 114, No. 5, 252-255 (2014). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{M. Shakiba} et al., Inf. Process. Lett. 114, No. 5, 252--255 (2014; Zbl 1371.94655) Full Text: DOI
Lu, Jiqiang; Yap, Wun-She; Henricksen, Matt; Heng, Swee-Huay Differential attack on nine rounds of the SEED block cipher. (English) Zbl 1284.94091 Inf. Process. Lett. 114, No. 3, 116-123 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lu} et al., Inf. Process. Lett. 114, No. 3, 116--123 (2014; Zbl 1284.94091) Full Text: DOI
Guo, Jian; Karpman, Pierre; Nikolić, Ivica; Wang, Lei; Wu, Shuang Analysis of BLAKE2. (English) Zbl 1337.94038 Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 402-423 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Guo} et al., Lect. Notes Comput. Sci. 8366, 402--423 (2014; Zbl 1337.94038) Full Text: DOI
Biryukov, Alex; Velichkov, Vesselin Automatic search for differential trails in ARX ciphers. (English) Zbl 1337.94025 Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 227-250 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Biryukov} and \textit{V. Velichkov}, Lect. Notes Comput. Sci. 8366, 227--250 (2014; Zbl 1337.94025) Full Text: DOI Link
Ideguchi, Kota; Tischhauser, Elmar; Preneel, Bart Internal differential collision attacks on the reduced-round Grøstl-0 hash function. (English) Zbl 1291.94101 Des. Codes Cryptography 70, No. 3, 251-271 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Ideguchi} et al., Des. Codes Cryptography 70, No. 3, 251--271 (2014; Zbl 1291.94101) Full Text: DOI
Sarkar, Palash On some connections between statistics and cryptology. (English) Zbl 1432.94142 J. Stat. Plann. Inference 148, 20-37 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Sarkar}, J. Stat. Plann. Inference 148, 20--37 (2014; Zbl 1432.94142) Full Text: DOI