Key-recovery attacks on ASASA
From MaRDI portal
Publication:2413617
DOI10.1007/S00145-017-9272-XzbMATH Open1400.94166OpenAlexW2768348791MaRDI QIDQ2413617FDOQ2413617
Authors: Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
Publication date: 14 September 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9272-x
Recommendations
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- On solving LPN using BKW and variants, Implementation and analysis
- On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$
- An Improved LPN Algorithm
- Cube Attacks on Tweakable Black Box Polynomials
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Noise-tolerant learning, the parity problem, and the statistical query model
- Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms
- Practical Cryptanalysis of SFLASH
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of 2R− Schemes
- Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
- Title not available (Why is that?)
- Decomposition of generic multivariate polynomials
- Title not available (Why is that?)
- Title not available (Why is that?)
- High order derivatives and decomposition of multivariate polynomials
- An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography
- A family of trapdoor ciphers
- Title not available (Why is that?)
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Polynomial decompositions in polynomial time
- Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions
- Public-key cryptography from new multivariate quadratic assumptions
- Public Key Cryptography – PKC 2004
- Cryptanalysis of HFE with Internal Perturbation
- Algorithmic regularity for polynomials and applications
- Title not available (Why is that?)
Cited In (9)
- An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Implicit white-box implementations: white-boxing ARX ciphers
- Key-recovery attack on the \(\mathsf {ASASA}\) cryptosystem with expanding S-boxes
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- Key-recovery attacks on \(\mathsf {ASASA}\)
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- Improved key-recovery attacks on reduced-round WEM-8
- A white-box speck implementation using self-equivalence encodings
Uses Software
This page was built for publication: Key-recovery attacks on \(\mathsf{ASASA}\)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2413617)