Keyword : block ciphers


Improved Multiple Impossible Differential Cryptanalysis of Midori128
Mohamed TOLBA Ahmed ABDELKHALEK Amr M. YOUSSEF 
Publication:   
Publication Date: 2017/08/01
Vol. E100-A  No. 8 ; pp. 1733-1737
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptanalysisimpossible differential cryptanalysisblock ciphersMidori128
 Summary | Full Text:PDF(473.7KB)

Fast Fourier Transform Key Recovery for Integral Attacks
Yosuke TODO Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/09/01
Vol. E98-A  No. 9 ; pp. 1944-1952
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block ciphersintegral attackEven-Mansourkey-alternating cipherFeistel structureFFTFWHT
 Summary | Full Text:PDF(867.4KB)

Network Adversary Attacks against Secure Encryption Schemes
Virgil D. GLIGOR Bryan PARNO Ji Sun SHIN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/02/01
Vol. E98-B  No. 2 ; pp. 267-279
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
network adversary attackssymmetric encryption schemeskey-protection propertiesblock ciphers
 Summary | Full Text:PDF(826.1KB)

Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient
Junko TAKAHASHI Toshinori FUKUNAGA Kazumaro AOKI Hitoshi FUJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 192-202
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundation
Keyword: 
side-channel attacksaccess-driven cache attacksblock cipherssoftware implementation
 Summary | Full Text:PDF(1.8MB)

Upper Bounds for the Security of Several Feistel Networks
Yosuke TODO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 39-48
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
block ciphersFeistel networksround functionskey recovery attacks
 Summary | Full Text:PDF(701.7KB)

A Note on the Construction of Differentially Uniform Permutations Using Extension Fields
Qichun WANG Haibin KAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/11/01
Vol. E95-A  No. 11 ; pp. 2080-2083
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
block ciphersvectorial Boolean functionsextension fields
 Summary | Full Text:PDF(81.9KB)

A Study of Multiple Characteristics Differential Cryptanalysis
Saeed SADEGHIAN Babak SADEGHIYAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/10/01
Vol. E94-A  No. 10 ; pp. 2053-2058
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
block ciphersdifferential cryptanalysismultiple characteristics
 Summary | Full Text:PDF(193.9KB)

Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
Eunjin LEE Jongsung KIM Deukjo HONG Changhoon LEE Jaechul SUNG Seokhie HONG Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/02/01
Vol. E91-A  No. 2 ; pp. 642-649
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
MISTY 1MISTY 2weak-key classesrelated-key amplified boomerang attackblock ciphers
 Summary | Full Text:PDF(722.7KB)

The Random-Block Feedback Mode for Block Ciphers
Yoonjeong KIM Yookun CHO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/06/25
Vol. E83-A  No. 6 ; pp. 1289-1291
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
block ciphersdifferential cryptanalysislinear cryptanalysisexhaustive key searchrandom-block feedback
 Summary | Full Text:PDF(140.8KB)