Polytopic cryptanalysis
From MaRDI portal
Publication:2820484
Recommendations
- From higher-order differentials to polytopic cryptyanalysis
- Multiple differential cryptanalysis: theory and practice
- scientific article; zbMATH DE number 417582
- scientific article; zbMATH DE number 503238
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
Cited in
(16)- Mixture integral attacks on reduced-round AES with a known/secret S-box
- Meet-in-the-middle attacks on AES with value constraints
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}
- scientific article; zbMATH DE number 1925556 (Why is no real title available?)
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Computational and Information Science
- Streebog compression function as PRF in secret-key settings
- Related-key attack on 5-round Kuznyechik
- Rotational differential-linear cryptanalysis revisited
- From higher-order differentials to polytopic cryptyanalysis
- Recent Trends in Algebraic Development Techniques
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- New cryptanalysis of LowMC with algebraic techniques
- The triangle differential cryptanalysis
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques
This page was built for publication: Polytopic cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2820484)