I was looking at benchmarks and it seems for native x86 calls ( non windows services ) the intel compiler produces better code I think the intel compiler on a windows machine though is icl.exe for win32.make I guess as you said it has to be in the path
I'am a bigenner in cyptology. It's really an interested domain. I have started in cryptography by modifyiong the round function of xtea and by modifying the p-layer of PRESENT. I find it sample but when I will do differential and linear cryptanalysis on them it becomes more difficult because I didn't find a sample example to understand more the principle. Can anyone help me with code c of differential cryptanalysis of PRESENT and XTEA. I will be grateful for you
Thanks alot for your help but I have already got it and I also modify xtea round function to become more secure but my problem now is to understand the principle of differential cryptanalysis that's why I need code c of of differential cryptanalysis in both of algorithms xtea and PRESENT
Okay I am just a boring old programmer you got me intrigued how do you produce code for the differential it would be incredibly long given the statistical spread of the output. I know for example AES is immune to any sort of differential attack if you look at the algorithm you can see why. I can tell you from practical doing it, that it's easier to just brute force attack these things.
That is why I suggest the code doesn't exist
If you want to find out how secure your modification is time the bruteforce attack on it.
No, because it does not exist. You have to write code, you don't just ask for it from somebody. It's like asking someone to send you the plans to make a house. Well, how many bedrooms do you want? How many bathrooms? What size garage? 1 story or 2 story? What colors do you want? Etc, etc.
There are two kinds of people in the world: those who can extrapolate from incomplete data.
There are only 10 types of people in the world, those who understand binary and those who don't.