Related-Key Attack on Full-Round PICARO
From MaRDI portal
Publication:2807197
DOI10.1007/978-3-319-31301-6_5zbMath1396.94065OpenAlexW2258236187MaRDI QIDQ2807197
Anne Canteaut, María Naya-Plasencia, Virginie Lallemand
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_5
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- New types of cryptanalytic attacks using related keys
- Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
- Provably Secure Higher-Order Masking of AES
- A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
This page was built for publication: Related-Key Attack on Full-Round PICARO