MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Master Windows Internals - Kernel Programming, Debugging & Architecture
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a groundbreaking paper on impossible differential cryptanalysis presented at Eurocrypt 2017. Delve into the new search tool developed by Yu Sasaki and Yosuke Todo, examining its design and cryptanalytic applications. Learn about the fundamentals of impossible differential attacks, their history, and the general methods employed. Understand the model block cipher, impossible-to-financial strength, and type structure. Examine the extended facial network, impossible differential assumptions, and a practical example. Conclude with insights on linear key schedules and the implications for modern cryptography.
Syllabus
Introduction
What is Impossible Differential Attack
New Impossible Differential
General Methods
History
Model Block Cipher
Impossible to Financial
Strengths
Type Structure
Illustration
Extended Facial Network
Impossible Differential
Assumptions
Middle
Example
Conclusion
Linear Key Schedule
Taught by
TheIACR