In this paper we do differential cryptanalysis of SAFER. We consider "truncated differentials" and apply them in an attack on 5-round SAFER, which finds the secret key in time much faster than by exhaustive search.
CITATION STYLE
Knudsen, L. R., & Berson, T. A. (1996). Truncated differentials of SAFER. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1039, pp. 15–26). Springer Verlag. https://doi.org/10.1007/3-540-60865-6_38
Mendeley helps you to discover research relevant for your work.