Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
From MaRDI portal
Publication:2010591
DOI10.1007/S00145-018-9285-0zbMath1435.94141OpenAlexW2796051658WikidataQ130031154 ScholiaQ130031154MaRDI QIDQ2010591
Yosuke Todo, Yu Sasaki, Gregor Leander
Publication date: 27 November 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-018-9285-0
Boolean functionCAESAR competitionScreamnonlinear invariant attackciphertext-only message-recovery attackiSCREAMMidori64
Related Items (9)
Rotational differential-linear cryptanalysis revisited ⋮ On the image of an affine subspace under the inverse function within a finite field ⋮ Constructing and deconstructing intentional weaknesses in symmetric ciphers ⋮ Distinguishing error of nonlinear invariant attacks ⋮ On degree-\(d\) zero-sum sets of full rank ⋮ Unnamed Item ⋮ Improved differential-linear attacks with applications to ARX ciphers ⋮ Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette} ⋮ Integral characteristics by keyspace partitioning
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tweakable block ciphers
- Proving resistance against invariant attacks: how to choose the round constants
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma
- Midori: A Block Cipher for Low Energy
- Non-Linear Approximations in Linear Cryptanalysis
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- Multidimensional Linear Cryptanalysis of Reduced Round Serpent
- Another Look at Complementation Properties
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Higher Order Differential Attack of a CAST Cipher
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Advanced Encryption Standard – AES
This page was built for publication: Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64