A method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element field
From MaRDI portal
Publication:2215268
DOI10.1007/s10559-020-00220-1zbMath1458.94209OpenAlexW3006668063WikidataQ122178087 ScholiaQ122178087MaRDI QIDQ2215268
S. M. Koniushok, M. V. Poremskyi, A. N. Alekseychuk
Publication date: 11 December 2020
Published in: Cybernetics and Systems Analysis (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10559-020-00220-1
discrete Fourier transformproof of securitycorrelation cryptanalysisfinite-state machineSNOW 2.0Strumok cipher
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On solving LPN using BKW and variants, Implementation and analysis
- Cryptographic properties of a new national encryption standard of Ukraine
- Upper bounds on the imbalance of discrete functions implemented by sequences of finite automata
- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
- Improved Linear Distinguishers for SNOW 2.0
- Fast Computation of Large Distributions and Its Cryptographic Applications
- Selected Areas in Cryptography
- Noise-tolerant learning, the parity problem, and the statistical query model
This page was built for publication: A method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element field