165
Voted
CRYPTO
15 years 6 months ago
1994 Springer
Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is similar but is based on studying approximate linea...
125
Voted
CRYPTO
15 years 6 months ago
1994 Springer
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
123
Voted
CRYPTO
15 years 6 months ago
1994 Springer
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
117
Voted
CRYPTO
15 years 6 months ago
1994 Springer
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limit...
117
Voted
CRYPTO
15 years 6 months ago
1994 Springer |