Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72
Biham E, Shamir A (1991) Differential cryptanalysis of FEAL and N-hash. Technical report CS91-17. In: Advances in cryptology. Proceedings of EUROCRYPT’91, Brighton, April 1991. Lecture notes in computer science, vol 547. Springer, Berlin, pp 1–16
Biham E, Shamir A (1992) Differential cryptanalysis of the full 16-round DES. In: Advances in cryptology. Proceedings of CRYPTO’92, Santa Barbara, August 1992. Lecture notes in computer science, vol 740. Springer, Berlin, pp 487–496
Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, Berlin
Biryukov A, Kushilevitz E (1998) From differential cryptanalysis to ciphertext-only attacks. In: Advances in cryptology. Proceedings of CRYPTO’98, Santa Barbara, August 1998. Lecture notes in computer science, vol 1462. Springer, Berlin, pp 72–88
Biham E, Biryukov A, Shamir A (1999) Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Advances in cryptology, Proceedings of EUROCRYPT’99, Prague, May 1999. Lecture notes in computer science, vol 1592. Springer, Berlin, pp 12–23
Biham E, Dunkelman O, Keller N (2002) New results on boomerang and rectangle attacks. In: Proceedings of fast software encryption 2002, Leuven, February 2002. Lecture notes in computer science, vol 2365. Springer, Berlin, pp 1–16
Kelsey J, Kohno T, Schneier B (1999) Amplified boomerang attacks against reduced-round MARS and serpent. In: Proceedings of fast software encryption 7, New York, April 2000. Lecture notes in computer science, vol 1978. Springer, Berlin, pp 75–93
Knudsen L (1995) Truncated and higher order differentials. In: Proceedings of fast software encryption 2, Leuven, December 1994. Lecture notes in computer science, vol 1008. Springer, Berlin, pp 196–211
Knudsen LR (1998) DEAL – A 128-bit block cipher, AES submission. http://www2.mat.dtu.dk/people/Lars.R.Knudsen/papers/deal.pdf
Lai X (1994) Higher order derivative and differential cryptanalysis. In: Proceedings of symposium on communication, coding and cryptography (in honor of J. L. Massey on the occasion of his 60th birthday)
Lai X, Massey JL, Murphy S (1991) Markov ciphers and differential cryptanalysis. In: Advances in cryptology. Proceedings of EUROCRYPT’91, Brighton, April 1991. Lecture notes in computer science, vol 547. Springer, Berlin, pp 17–38
Miyaguchi S, Shiraishi A, Shimizu A (1988) Fast data encryption algorithm FEAL-8. Rev Electr Commun laboratories 36(4): 433–437
National Bureau of Standards (1977) Data encryption standard, U.S. Department of Commerce, FIPS pub. 46
Shimizu A, Miyaguchi S (1987) Fast data encryption algorithm FEAL. In: Advances in cryptology. Proceedings of EUROCRYPT’87, Amsterdam. Lecture notes in computer science, pp 267–278
Vaudenay S (1998) Provable security for block ciphers by decorrelation. In: Proceedings of STACS’98, Paris, February 1998. Lecture notes in computer science, vol 1373. Springer, Berlin, pp 249–275
Wagner D (1999) The boomerang attack. In: Proceedings of fast software encryption, Rome, March 1999. Lecture notes in computer science, vol 1636. Springer, Berlin, pp 156–170
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Biham, E. (2011). Differential Cryptanalysis. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_572
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_572
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering