Pages that link to "Item:Q3627440"
From MaRDI portal
The following pages link to Cube Attacks on Tweakable Black Box Polynomials (Q3627440):
Displayed 50 items.
- Conditional differential cryptanalysis of 105 round Grain v1 (Q267806) (← links)
- A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions (Q352050) (← links)
- Counting and characterising functions with ``fast points'' for differential attacks (Q505073) (← links)
- Espresso: a stream cipher for 5G wireless communication systems (Q505077) (← links)
- Observing biases in the state: case studies with Trivium and Trivia-SC (Q510484) (← links)
- Antiderivative functions over \(\mathbb{F}_{2^n}\) (Q510493) (← links)
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- Optimising Gröbner bases on Bivium (Q626947) (← links)
- Cryptographic properties and application of a generalized unbalanced Feistel network structure (Q662179) (← links)
- Distinguishing properties and applications of higher order derivatives of Boolean functions (Q726339) (← links)
- New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions (Q778439) (← links)
- FAN: a lightweight authenticated cryptographic algorithm (Q826267) (← links)
- Correlation cube attacks: from weak-key distinguisher to key recovery (Q1648859) (← links)
- Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity (Q1667453) (← links)
- Rigorous upper bounds on data complexities of block cipher cryptanalysis (Q1676236) (← links)
- Finding integral distinguishers with ease (Q1726670) (← links)
- Design and analysis of small-state grain-like stream ciphers (Q1749794) (← links)
- Conditional cube attack on round-reduced River Keyak (Q1752548) (← links)
- New results on the state cycles of Trivium (Q1756000) (← links)
- New generalized almost perfect nonlinear functions (Q1995225) (← links)
- Optimal parameters for the WG stream cipher family (Q2016392) (← links)
- Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC (Q2032168) (← links)
- Modeling for three-subset division property without unknown subset (Q2044753) (← links)
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD (Q2055620) (← links)
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) (Q2056692) (← links)
- Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack (Q2104924) (← links)
- TNT: how to tweak a block cipher (Q2119027) (← links)
- Improving bounds on probabilistic affine tests to estimate the nonlinearity of Boolean functions (Q2130055) (← links)
- Counting active S-boxes is not enough (Q2152037) (← links)
- Some cryptanalytic results on TRIAD (Q2179386) (← links)
- Counting Boolean functions with faster points (Q2200517) (← links)
- The MILP-aided conditional differential attack and its application to Trivium (Q2227128) (← links)
- An improved degree evaluation method of NFSR-based cryptosystems (Q2243894) (← links)
- New cube distinguishers on NFSR-based stream ciphers (Q2285784) (← links)
- Multiset structural attack on generalized Feistel networks (Q2298200) (← links)
- High order differential attacks on stream ciphers (Q2376658) (← links)
- Applying cube attacks to stream ciphers in realistic scenarios (Q2376659) (← links)
- State cycles, initialization and the Trivium stream cipher (Q2376662) (← links)
- Quark: a lightweight hash (Q2377065) (← links)
- Higher order differentiation over finite fields with applications to generalising the cube attack (Q2407059) (← links)
- Key-recovery attacks on \(\mathsf{ASASA}\) (Q2413617) (← links)
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (Q2413618) (← links)
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (Q2416936) (← links)
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 (Q2434149) (← links)
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums (Q2692351) (← links)
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC (Q2692352) (← links)
- Lower bounds on the degree of block ciphers (Q2692355) (← links)
- Cryptanalysis of Ascon (Q2790053) (← links)
- Another View of the Division Property (Q2835605) (← links)
- Cryptographic Analysis of All 4 × 4-Bit S-Boxes (Q2889866) (← links)