Pages that link to "Item:Q2482339"
From MaRDI portal
The following pages link to On probability of success in linear and differential cryptanalysis (Q2482339):
Displaying 49 items.
- Another look at normal approximations in cryptanalysis (Q293721) (← links)
- Capability of evolutionary cryptosystems against differential cryptanalysis (Q350963) (← links)
- Evolutionary cryptography against multidimensional linear cryptanalysis (Q351026) (← links)
- A methodology for differential-linear cryptanalysis and its applications (Q499655) (← links)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (Q510482) (← links)
- On quadratic approximations in block ciphers (Q734264) (← links)
- Improved (related-key) differential cryptanalysis on GIFT (Q832340) (← links)
- Linear cryptanalysis of reduced-round SPECK (Q903200) (← links)
- Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity (Q1667453) (← links)
- Rigorous upper bounds on data complexities of block cipher cryptanalysis (Q1676236) (← links)
- Multidimensional linear cryptanalysis (Q1715851) (← links)
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses (Q1749795) (← links)
- Improving key-recovery in linear attacks: application to 28-round PRESENT (Q2055609) (← links)
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (Q2068387) (← links)
- Improved differential-linear attack with application to round-reduced Speck32/64 (Q2096647) (← links)
- Linear cryptanalysis of FF3-1 and FEA (Q2120066) (← links)
- Differential-linear cryptanalysis from an algebraic perspective (Q2128998) (← links)
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT (Q2151298) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- A correlation attack on full SNOW-V and SNOW-Vi (Q2170078) (← links)
- Revisiting the wrong-key-randomization hypothesis (Q2175215) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- Solving LPN using covering codes (Q2303453) (← links)
- Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis (Q2349643) (← links)
- Differential-linear cryptanalysis revisited (Q2408590) (← links)
- Accurate estimates of the data complexity and success probability for various cryptanalyses (Q2430686) (← links)
- Security of the SMS4 block cipher against differential cryptanalysis (Q2434519) (← links)
- Differential attack on five rounds of the SC2000 block cipher (Q2434544) (← links)
- Differential attack on nine rounds of the SEED block cipher (Q2445399) (← links)
- Affine linear cryptanalysis (Q2632832) (← links)
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 (Q2946869) (← links)
- Optimization of $$\mathsf {LPN}$$ Solving Algorithms (Q2958144) (← links)
- Improved Differential Cryptanalysis of CAST-128 and CAST-256 (Q2980843) (← links)
- Multiple Differential Cryptanalysis: Theory and Practice (Q3013076) (← links)
- Differential-Multiple Linear Cryptanalysis (Q3056878) (← links)
- Related-Key Cryptanalysis of Midori (Q3179490) (← links)
- Coded-BKW: Solving LWE Using Lattice Codes (Q3457103) (← links)
- Cryptanalysis of CTC2 (Q3623047) (← links)
- The Cryptanalysis of Reduced-Round SMS4 (Q3644192) (← links)
- Lombardi Drawings of Knots and Links (Q4625105) (← links)
- Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK (Q5095926) (← links)
- DISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTS (Q5151445) (← links)
- A Differential-Linear Attack on 12-Round Serpent (Q5504632) (← links)
- Another look at key randomisation hypotheses (Q6070344) (← links)
- Truncated boomerang attacks and application to AES-based ciphers (Q6083123) (← links)
- Optimizing rectangle attacks: a unified and generic framework for key recovery (Q6135405) (← links)
- And Rijndael? Automatic related-key differential analysis of Rijndael (Q6160824) (← links)
- Optimising linear key recovery attacks with affine Walsh transform pruning (Q6175986) (← links)
- Automatic boomerang attacks search on Rijndael (Q6193391) (← links)