A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
From MaRDI portal
Publication:2948331
DOI10.1007/978-3-662-46800-5_11zbMATH Open1370.94525OpenAlexW2111902481MaRDI QIDQ2948331FDOQ2948331
Brice Minaud, Gregor Leander, Sondre Rønjom
Publication date: 30 September 2015
Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46800-5_11
Cited In (27)
- On the primitivity of the AES-128 key-schedule
- On the resilience of Even-Mansour to invariant permutations
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- Weak-key distinguishers for AES
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Cryptanalysis of \texttt{NORX} v2.0
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Влияние приводимости линейного преобразования на выбор раундовых констант
- Differential-linear and related key cryptanalysis of round-reduced scream
- Cryptographic properties of cyclic binary matrices
- New observations on invariant subspace attack
- Nonlinear Invariant Attack
- Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE
- On invariant subspaces in the Lai-Massey scheme and a primitivity reduction
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- New representations of the AES key schedule
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Generalized Feistel ciphers for efficient prime field masking
- The permutation group insight on the diffusion property of linear mappings
- Rotational differential-linear cryptanalysis revisited
- New representations of the AES key schedule
- Характеризация отображений через свойство неизометричности
- Improving the security and efficiency of block ciphers based on LS-designs
- On the image of an affine subspace under the inverse function within a finite field
Uses Software
This page was built for publication: A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2948331)