In [1,2] we introduced the notion of differential cryptanalysis based on chosen plaintext attacks. In [3,4] we described the application of differential cryptanalysis to Feal[13,12] and extended the method to known plaintext attacks. In this paper we apply differential cryptanalytic methods to the hash function Snefru[10] and to the cryptosystems Khafre[11], REDOC-II[6,7], LOKI[5] and Lucifer[8].
CITATION STYLE
Biham, E., & Shamir, A. (1992). Differential cryptanalysis of snefru, khafre, REDOC-II, LOKI and lucifer. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 576 LNCS, pp. 156–171). Springer Verlag. https://doi.org/10.1007/3-540-46766-1_11
Mendeley helps you to discover research relevant for your work.