A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
From MaRDI portal
Publication:2948331
DOI10.1007/978-3-662-46800-5_11zbMath1370.94525OpenAlexW2111902481MaRDI QIDQ2948331
Brice Minaud, Gregor Leander, Sondre Rønjom
Publication date: 30 September 2015
Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46800-5_11
Related Items (24)
On the resilience of Even-Mansour to invariant permutations ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A new non-random property of 4.5-round PRINCE ⋮ Weak-key distinguishers for AES ⋮ Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE ⋮ New observations on invariant subspace attack ⋮ Rotational differential-linear cryptanalysis revisited ⋮ Nonlinear Invariant Attack ⋮ On the primitivity of the AES-128 key-schedule ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ On the image of an affine subspace under the inverse function within a finite field ⋮ Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Differential-linear and related key cryptanalysis of round-reduced scream ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ Cryptanalysis of \texttt{NORX} v2.0 ⋮ Cryptographic properties of cyclic binary matrices ⋮ On invariant subspaces in the Lai-Massey scheme and a primitivity reduction ⋮ Влияние приводимости линейного преобразования на выбор раундовых констант ⋮ The permutation group insight on the diffusion property of linear mappings ⋮ Характеризация отображений через свойство неизометричности ⋮ New representations of the AES key schedule ⋮ Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette} ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis
Uses Software
This page was built for publication: A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro