Block cipher invariants as eigenvectors of correlation matrices (Q5915627): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: How to Garble Arithmetic Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Concrete efficiency improvements for multiparty garbling with an honest majority / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of the “Free-XOR” Technique / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783722 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asynchronous Multiparty Computation: Theory and Implementation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Computation from Somewhat Homomorphic Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits / rank
 
Normal rank
Property / cites work
 
Property / cites work: The TinyTable protocol for 2-party secure computation, or: Gate-scrambling revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast garbling of circuits under standard assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Low cost constant round MPC combining BMR and oblivious transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Garbled Circuit: Free XOR Gates and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Constant Round Multi-party Computation Combining BMR and SPDZ / rank
 
Normal rank
Property / cites work
 
Property / cites work: LEGO for Two-Party Secure Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Two-Party Computation Is Practical / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two Halves Make a Whole / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Attacks on Reduced-Round Camellia-128/192/256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-Middle Attacks on Generic Feistel Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS / rank
 
Normal rank
Property / cites work
 
Property / cites work: $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms / rank
 
Normal rank
Property / cites work
 
Property / cites work: LBlock: A Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible Differential Attack on Reduced-Round TWINE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible Differential Cryptanalysis of Reduced-Round SKINNY / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Single-Key Attacks on 9-Round AES-192/256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use metaheuristics for design of symmetric-key primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improving the Generalized Feistel / rank
 
Normal rank

Revision as of 17:26, 17 July 2024

scientific article; zbMATH DE number 6996113
Language Label Description Also known as
English
Block cipher invariants as eigenvectors of correlation matrices
scientific article; zbMATH DE number 6996113

    Statements

    Block cipher invariants as eigenvectors of correlation matrices (English)
    0 references
    0 references
    20 December 2018
    0 references
    invariant subspace attack
    0 references
    nonlinear invariant attack
    0 references
    linear cryptanalysis
    0 references
    integral cryptanalysis
    0 references
    correlation matrices
    0 references
    Midori-64
    0 references
    MANTIS
    0 references
    0 references

    Identifiers