Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures (Q404952): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Importer (talk | contribs)
Changed an Item
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A60 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 90C10 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 6340017 / rank
 
Normal rank
Property / zbMATH Keywords
 
\textsc{PRINTcipher}
Property / zbMATH Keywords: \textsc{PRINTcipher} / rank
 
Normal rank
Property / zbMATH Keywords
 
invariant coset attack
Property / zbMATH Keywords: invariant coset attack / rank
 
Normal rank
Property / zbMATH Keywords
 
mixed integer linear programming
Property / zbMATH Keywords: mixed integer linear programming / rank
 
Normal rank
Property / zbMATH Keywords
 
weak keys
Property / zbMATH Keywords: weak keys / rank
 
Normal rank
Property / zbMATH Keywords
 
chosen plaintext attack
Property / zbMATH Keywords: chosen plaintext attack / rank
 
Normal rank
Property / zbMATH Keywords
 
key recovery
Property / zbMATH Keywords: key recovery / rank
 
Normal rank

Revision as of 18:14, 29 June 2023

scientific article
Language Label Description Also known as
English
Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
scientific article

    Statements

    Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures (English)
    0 references
    0 references
    0 references
    0 references
    4 September 2014
    0 references
    0 references
    \textsc{PRINTcipher}
    0 references
    invariant coset attack
    0 references
    mixed integer linear programming
    0 references
    weak keys
    0 references
    chosen plaintext attack
    0 references
    key recovery
    0 references