The MALICIOUS framework: embedding backdoors into tweakable block ciphers
From MaRDI portal
Publication:2102066
DOI10.1007/978-3-030-56877-1_9zbMath1504.94178OpenAlexW3048736713MaRDI QIDQ2102066
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_9
Related Items
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques, Can a differential attack work for an arbitrarily large number of rounds?, Pholkos -- efficient large-state tweakable block ciphers from the AES round function, Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation, Algebraic meet-in-the-middle attack on LowMC, On perfect linear approximations and differentials over two-round SPNs, Constructing and deconstructing intentional weaknesses in symmetric ciphers, New cryptanalysis of LowMC with algebraic techniques, On weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of Enigma
Uses Software
Cites Work
- Tweakable block ciphers
- \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\)
- Linear equivalence of block ciphers with partial non-linear layers: application to LowMC
- Optimized Interpolation Attacks on LowMC
- Malicious Hashing: Eve’s Variant of SHA-1
- Dual EC: A Standardized Back Door
- Higher-Order Cryptanalysis of LowMC
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- Limited-Birthday Distinguishers for Hash Functions
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- On Differential Uniformity of Maps that May Hide an Algebraic Trapdoor
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- Ciphers for MPC and FHE
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- A family of trapdoor ciphers
- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs
- Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
- Selected Areas in Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item