Cryptanalysis of full LowMC and LowMC-M with algebraic techniques (Q2129003): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_13 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3090660998 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphers for MPC and FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of SP Networks with Partial Non-Linear Layers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Attacks on Keccak-224 and Keccak-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimized Interpolation Attacks on LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Cryptanalysis of LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Block Ciphers That Are Easier to Mask: How Far Can We Go? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditional Cube Attack on Reduced-Round Keccak Sponge Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimage attacks on round-reduced Keccak-224/256 via an allocating approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic verification of differential characteristics: application to reduced Gimli / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409105 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The MALICIOUS framework: embedding backdoors into tweakable block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Collision Attacks on Round-Reduced Keccak / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak} / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polytopic Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel collision search with cryptanalytic applications / rank
 
Normal rank

Latest revision as of 18:49, 28 July 2024

scientific article
Language Label Description Also known as
English
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
scientific article

    Statements

    Cryptanalysis of full LowMC and LowMC-M with algebraic techniques (English)
    0 references
    0 references
    0 references
    0 references
    22 April 2022
    0 references
    LowMC
    0 references
    LowMC-M
    0 references
    linearization
    0 references
    key recovery
    0 references
    negligible memory
    0 references
    difference enumeration attack
    0 references

    Identifiers