How Far Can We Go Beyond Linear Cryptanalysis?
From MaRDI portal
Publication:5465830
DOI10.1007/978-3-540-30539-2_31zbMath1094.94025OpenAlexW1570998442MaRDI QIDQ5465830
Serge Vaudenay, Thomas Baignères, Pascal Junod
Publication date: 12 August 2005
Published in: Advances in Cryptology - ASIACRYPT 2004 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-30539-2_31
Related Items (52)
Linear cryptanalysis of FF3-1 and FEA ⋮ Another look at normal approximations in cryptanalysis ⋮ An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers ⋮ Coded-BKW: Solving LWE Using Lattice Codes ⋮ Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 ⋮ Making the BKW algorithm practical for LWE ⋮ Evolutionary cryptography against multidimensional linear cryptanalysis ⋮ Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity ⋮ Rigorous upper bounds on data complexities of block cipher cryptanalysis ⋮ When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack ⋮ On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 ⋮ PNB-focused differential cryptanalysis of ChaCha stream cipher ⋮ Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model ⋮ A geometric approach to linear cryptanalysis ⋮ Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms ⋮ Linear Distinguishing Attack on Shannon ⋮ Distinguishing error of nonlinear invariant attacks ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ Accurate estimates of the data complexity and success probability for various cryptanalyses ⋮ New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba ⋮ Multidimensional linear cryptanalysis ⋮ Cryptanalysis of Rabbit ⋮ Multidimensional linear distinguishing attacks and Boolean functions ⋮ Differential cryptanalysis of PRESENT-like cipher ⋮ Making the Most of Your Samples ⋮ Quantum algorithms for the resiliency of vectorial Boolean functions ⋮ Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems ⋮ Multiple Differential Cryptanalysis: Theory and Practice ⋮ Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity ⋮ Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses ⋮ On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers ⋮ Practical cryptanalysis of Bluetooth encryption with condition masking ⋮ On the complexity of the BKW algorithm on LWE ⋮ Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version ⋮ Linear Slide Attacks on the KeeLoq Block Cipher ⋮ On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations ⋮ Distinguishing attacks on stream ciphers based on arrays of pseudo-random words ⋮ Connections between quaternary and Boolean bent functions ⋮ Linear Cryptanalysis of Non Binary Ciphers ⋮ Distinguishing Attack Against TPypy ⋮ On quadratic approximations in block ciphers ⋮ Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses ⋮ Improved differential-linear attacks with applications to ARX ciphers ⋮ A Statistical Saturation Attack against the Block Cipher PRESENT ⋮ Optimal Randomness Extraction from a Diffie-Hellman Element ⋮ Многомерный линейный метод и показатели рассеивания линейной среды шифрпреобразований ⋮ Cryptanalysis of an E0-like combiner with memory ⋮ An overview of distinguishing attacks on stream ciphers ⋮ Improved distinguishers for HC-128 ⋮ Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere ⋮ The Complexity of Distinguishing Distributions (Invited Talk) ⋮ BehavioCog: An Observation Resistant Authentication Scheme
This page was built for publication: How Far Can We Go Beyond Linear Cryptanalysis?