Pages that link to "Item:Q5465830"
From MaRDI portal
The following pages link to How Far Can We Go Beyond Linear Cryptanalysis? (Q5465830):
Displaying 47 items.
- Another look at normal approximations in cryptanalysis (Q293721) (← links)
- Evolutionary cryptography against multidimensional linear cryptanalysis (Q351026) (← links)
- Differential cryptanalysis of PRESENT-like cipher (Q494577) (← links)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (Q510482) (← links)
- Multidimensional linear distinguishing attacks and Boolean functions (Q662200) (← links)
- On quadratic approximations in block ciphers (Q734264) (← links)
- Improved distinguishers for HC-128 (Q766246) (← links)
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words (Q990129) (← links)
- Cryptanalysis of an E0-like combiner with memory (Q1021238) (← links)
- An overview of distinguishing attacks on stream ciphers (Q1032489) (← links)
- Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity (Q1667453) (← links)
- Rigorous upper bounds on data complexities of block cipher cryptanalysis (Q1676236) (← links)
- When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack (Q1676238) (← links)
- Multidimensional linear cryptanalysis (Q1715851) (← links)
- Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems (Q1745698) (← links)
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses (Q1749795) (← links)
- On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers (Q1752540) (← links)
- Practical cryptanalysis of Bluetooth encryption with condition masking (Q1753167) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- Connections between quaternary and Boolean bent functions (Q2033361) (← links)
- Linear cryptanalysis of FF3-1 and FEA (Q2120066) (← links)
- Making the BKW algorithm practical for LWE (Q2152043) (← links)
- Quantum algorithms for the resiliency of vectorial Boolean functions (Q2239512) (← links)
- On the complexity of the BKW algorithm on LWE (Q2256097) (← links)
- Accurate estimates of the data complexity and success probability for various cryptanalyses (Q2430686) (← links)
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 (Q2946869) (← links)
- Multiple Differential Cryptanalysis: Theory and Practice (Q3013076) (← links)
- Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere (Q3104729) (← links)
- Многомерный линейный метод и показатели рассеивания линейной среды шифрпреобразований (Q3381893) (← links)
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers (Q3455483) (← links)
- Coded-BKW: Solving LWE Using Lattice Codes (Q3457103) (← links)
- Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 (Q3457132) (← links)
- Linear Distinguishing Attack on Shannon (Q3511171) (← links)
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba (Q3525696) (← links)
- Cryptanalysis of Rabbit (Q3540145) (← links)
- Linear Slide Attacks on the KeeLoq Block Cipher (Q3600321) (← links)
- On the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their Generalizations (Q3600455) (← links)
- A Statistical Saturation Attack against the Block Cipher PRESENT (Q3623045) (← links)
- Optimal Randomness Extraction from a Diffie-Hellman Element (Q3627458) (← links)
- Making the Most of Your Samples (Q4641589) (← links)
- Linear Cryptanalysis of Non Binary Ciphers (Q5452257) (← links)
- Distinguishing Attack Against TPypy (Q5452275) (← links)
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses (Q5458201) (← links)
- The Complexity of Distinguishing Distributions (Invited Talk) (Q5502803) (← links)
- BehavioCog: An Observation Resistant Authentication Scheme (Q5854425) (← links)
- Improved differential-linear attacks with applications to ARX ciphers (Q5918561) (← links)
- Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms (Q6159444) (← links)