Differential cryptanalysis
Surveys & Tutorials
Differential Cryptanalysis: A Literature Survey
(Terry Ritter)
Survey on Differential Probability
(Kwangsu Lee, 1999)
A Tutorial on Linear and Differential Cryptanalysis
(Howard Heys)
Papers
Differential cryptanalysis of DES-like cryptosystems
(Eli Biham, Adi Shamir, Crypto '90)
Markov Ciphers and Differential Cryptanalysis
(Xuejia Lai, James Massey, Sean Murphy, Eurocrypt '91)
Differential Cryptanalysis of the Full 16-Round DES
(Differential Cryptanalysis of the Full 16-round DES)
Provable Security Against a Differential Attack
(Kaisa Nyberg, Lars Knudsen, J Crypt 1995)
Links between Differential and Linear Cryptanalysis
(Florent Chabaud, Serge Vaudenay, Eurocrypt '94)
Differential Cryptanalysis of Lucifer
(Ishai Ben-Aroya and Eli Biham, JoC 1996)
Substitution-Permutation Networks
Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis
(Howard M. Heys and Stafford E. Tavares, JoC 1996)
Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs
(Liam Keliher, Henk Meijer, Stafford Tavares, eprint 2001/033)
Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis
(Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shinichi Kawamura, eprint 2001/070)
Differential Probability
Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability
(Kazumaro Aoki, Kazuo Ohta, IEICE 1997)
Addend Dependency of Differential/Linear Probability of Addition
(Hiroshi Miyano, IEICE 98)
Efficient Algorithms for Computing Differential Properties of Addition
(Helger Lipmaa, Shiho Moriai, 2001.15.01.01)
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings
(Lipmaa, INDOCRYPT 2002)
On the Additive Differential Probability of Exclusive-Or
(Helger Lipmaa, Johan Wallén and Philippe Dumas, FSE 2004)
On the Differential and Linear Properties of Addition
(Johan Wallén (MSc thesis, HUT 2004))
Applications
Differential Cryptanalysis of a Reduced-Round SEED
(Yanami, Shimoyama, SCN 2002)
Differential Analysis of Modular Addition
(Alexis Warner Machado, 2001)
Non-XOR Differentials
Additive Differentials
Upper bounds on differential characteristics in Twofish
(Niels Ferguson, 1998)
New Results on the Twofish Encryption Algorithm
(Schneier, Kelsey, Whiting, Wagner, Hall, Ferguson, 1999)
Multiplicative Differentials
Cryptanalysis of Multiswap
(Nikita Borisov, Monica Chew, Rob Johnson, and David Wagner)
Attacks on concrete ciphers
The Best Differential Characteristic Search of FEAL
(Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai, 1998)
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like Rijndael, E2
(Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai, 2000)
Differential Cryptanalysis, Key-dependent S-boxes, and Twofish
(Sean Murphy, M.J.B. Robshaw)
Truncated differential cryptanalysis of five rounds of Salsa20
(Paul Crowley, 2005)
Higher Order Differentials
Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
(Shimoyama, Moriai, Kaneko, Tsujii, 1999)
Impossible Differentials
Essential Papers
DEAL - A 128-bit Block Cipher
(Lars R. Knudsen, 1998)
Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials
(Eli Biham, Alex Biryukov, Adi Shamir, 1999)
Cryptology Pointers
by
Helger Lipmaa
Got any suggestions or additional links? Mail to
NB! If you find any broken links, please be kind and report them to me together with their current location!
(C) Helger Lipmaa 1997-2009.