Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Biham E, Shamir A (1991) Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifier. In: Feigenbaum J (ed) Advances in cryptology—CRYPTO’91. Lecture notes in computer science, vol 576. Springer, Berlin, pp 156–171
Knudsen LR (1995) Truncated and higher order differentials. In: Preneel B (ed) Fast software encryption, FSE’94. Lecture notes in computer science, vol 1008. Springer, Berlin, pp 196–211
Knudsen LR, Berson TA (1996) Truncated differentials of SAFER. In: Gollmann D (ed) Fast software encryption, FSE’96. Lecture notes in computer science, vol 1039. Springer, Berlin, pp 15–26
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Biryukov, A. (2011). Truncated Differentials. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_622
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_622
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering