On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
From MaRDI portal
Publication:2946869
DOI10.1007/978-3-662-43933-3_2zbMATH Open1321.94043OpenAlexW2185027341MaRDI QIDQ2946869FDOQ2946869
Authors: Andrey Bogdanov, Elmar Tischhauser
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_2
Recommendations
- Revisiting the wrong-key-randomization hypothesis
- scientific article; zbMATH DE number 4139669
- On the Impossibility of Private Key Cryptography with Weakly Random Keys
- scientific article; zbMATH DE number 1979290
- scientific article; zbMATH DE number 1808251
- On the equivalent keys in multivariate cryptosystems
- Related randomness security for public key encryption, revisited
- Filtered nonlinear cryptanalysis of reduced-round serpent, and the wrong-key randomization hypothesis
- scientific article; zbMATH DE number 3963719
- The equivalence of the random oracle model and the ideal cipher model, revisited
linear cryptanalysisblock ciphersdata complexitykey equivalencelinear hull effectwrong key randomisation hypothesis
Cites Work
- Piccolo: An Ultra-Lightweight Blockcipher
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- On probability of success in linear and differential cryptanalysis
- A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
- On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN
- Multidimensional Extension of Matsui’s Algorithm 2
- Title not available (Why is that?)
- Title not available (Why is that?)
- Probability distributions of correlation and differentials in block ciphers
- How Far Can We Go Beyond Linear Cryptanalysis?
- Optimal key ranking procedures in a statistical cryptanalysis.
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Dependent linear approximations: the algorithm of Biryukov and others revisited
- Correlation theorems in cryptanalysis
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Title not available (Why is that?)
- Weak keys of reduced-round PRESENT for linear cryptanalysis
- Linear cryptanalysis using multiple linear approximations
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
- The effectiveness of the linear hull effect
- Title not available (Why is that?)
- The Complexity of Distinguishing Distributions (Invited Talk)
- Advances in cryptology - EUROCRYPT '94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994. Proceedings
Cited In (14)
- Generalization of one method of a filter generator key recovery
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
- Another look at normal approximations in cryptanalysis
- Multidimensional linear cryptanalysis
- On linear hulls and trails
- Another look at key randomisation hypotheses
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
- Another look at success probability of linear cryptanalysis
- Rigorous upper bounds on data complexities of block cipher cryptanalysis
- Revisiting the wrong-key-randomization hypothesis
- Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Linear cryptanalysis of the PP-1 and PP-2 block ciphers
This page was built for publication: On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946869)