Square attack on the 14-round block cipher SMS4

被引:0
|
作者
Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China [1 ]
机构
来源
Xi'an Dianzi Keji Daxue Xuebao | 2008年 / 1卷 / 105-109期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Analysis of Two Attacks on Reduced-Round Versions of the SMS4
    Toz, Deniz
    Dunkelman, Orr
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 141 - +
  • [32] Securing SMS4 Cipher against Differential Power Analysis and Its VLSI Implementation
    Bai, Xuefei
    Xu, Yanhua
    Guo, Li
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 167 - 172
  • [33] Full-Round Differential Attack on TWIS Block Cipher
    Su, Bozhan
    Wu, Wenling
    Zhang, Lei
    Li, Yanjun
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 234 - +
  • [34] Full-round differential attack on DoT block cipher
    Kumar, Manoj
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (02): : 507 - 519
  • [35] Related-Key Boomerang Attack on Block Cipher SQUARE
    Koo, Bonwook
    Yeom, Yongjin
    Song, Junghwan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 3 - 9
  • [36] Full-round impossible differential attack on shadow block cipher
    Yuting Liu
    Yongqiang Li
    Huiqin Chen
    Mingsheng Wang
    Cybersecurity, 6
  • [37] Full-round impossible differential attack on shadow block cipher
    Liu, Yuting
    Li, Yongqiang
    Chen, Huiqin
    Wang, Mingsheng
    CYBERSECURITY, 2023, 6 (01)
  • [38] A Fast VLSI Design of SMS4 Cipher Based on Twisted BDD S-Box Architecture
    Bai, Xuefei
    Guo, Li
    Huang, Lu
    Xu, Yanhua
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 345 - 348
  • [39] Design and Implementation of the Block Cipher-SMS4 IP Core
    Wang Bin
    Lan Ju-long
    Guo Yun-fei
    Zhang Yuan-yang
    MATERIALS AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2010, 129-131 : 881 - +
  • [40] Impossible Differential Attack against 14-Round Piccolo-80 without Relying on Full Code Book
    Todo, Yosuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01): : 154 - 157