On probability of success in linear and differential cryptanalysis
From MaRDI portal
Publication:2482339
DOI10.1007/s00145-007-9013-7zbMath1147.68510OpenAlexW2091612798MaRDI QIDQ2482339
Publication date: 16 April 2008
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/11693/23230
Related Items (49)
Linear cryptanalysis of FF3-1 and FEA ⋮ Differential-linear cryptanalysis from an algebraic perspective ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ Another look at normal approximations in cryptanalysis ⋮ Affine linear cryptanalysis ⋮ Related-Key Cryptanalysis of Midori ⋮ Coded-BKW: Solving LWE Using Lattice Codes ⋮ Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT ⋮ Capability of evolutionary cryptosystems against differential cryptanalysis ⋮ Evolutionary cryptography against multidimensional linear cryptanalysis ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ A correlation attack on full SNOW-V and SNOW-Vi ⋮ Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity ⋮ Revisiting the wrong-key-randomization hypothesis ⋮ Differential-linear cryptanalysis revisited ⋮ Rigorous upper bounds on data complexities of block cipher cryptanalysis ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK ⋮ On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 ⋮ Another look at key randomisation hypotheses ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ Optimization of $$\mathsf {LPN}$$ Solving Algorithms ⋮ Optimizing rectangle attacks: a unified and generic framework for key recovery ⋮ And Rijndael? Automatic related-key differential analysis of Rijndael ⋮ Optimising linear key recovery attacks with affine Walsh transform pruning ⋮ Linear cryptanalysis of reduced-round SPECK ⋮ Automatic boomerang attacks search on Rijndael ⋮ Accurate estimates of the data complexity and success probability for various cryptanalyses ⋮ Security of the SMS4 block cipher against differential cryptanalysis ⋮ Differential attack on five rounds of the SC2000 block cipher ⋮ Improved Differential Cryptanalysis of CAST-128 and CAST-256 ⋮ Multidimensional linear cryptanalysis ⋮ Differential attack on nine rounds of the SEED block cipher ⋮ Lombardi Drawings of Knots and Links ⋮ DISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTS ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ Multiple Differential Cryptanalysis: Theory and Practice ⋮ Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity ⋮ Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses ⋮ Differential-Multiple Linear Cryptanalysis ⋮ On quadratic approximations in block ciphers ⋮ Cryptanalysis of CTC2 ⋮ Solving LPN using covering codes ⋮ Improving key-recovery in linear attacks: application to 28-round PRESENT ⋮ The Cryptanalysis of Reduced-Round SMS4 ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ A Differential-Linear Attack on 12-Round Serpent ⋮ Improved differential-linear attack with application to round-reduced Speck32/64 ⋮ Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis
Cites Work
- Approximation Theorems of Mathematical Statistics
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- New Results in Linear Cryptanalysis of RC5
- Advances in Cryptology – CRYPTO 2004
- Fast Software Encryption
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: On probability of success in linear and differential cryptanalysis