A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
From MaRDI portal
Publication:2948331
Recommendations
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- New observations on invariant subspace attack
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Block cipher invariants as eigenvectors of correlation matrices
Cited in
(28)- On invariant subspaces in the Lai-Massey scheme and a primitivity reduction
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- On the resilience of Even-Mansour to invariant permutations
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- Weak-key distinguishers for AES
- New representations of the AES key schedule
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- New observations on invariant subspace attack
- On the primitivity of the AES-128 key-schedule
- Cryptographic properties of cyclic binary matrices
- New representations of the AES key schedule
- Generalized Feistel ciphers for efficient prime field masking
- The permutation group insight on the diffusion property of linear mappings
- Влияние приводимости линейного преобразования на выбор раундовых констант
- Characterization of mappings by the nonisometricity property
- Improving the security and efficiency of block ciphers based on LS-designs
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- Cryptanalysis of \texttt{NORX} v2.0
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Differential-linear and related key cryptanalysis of round-reduced scream
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Rotational differential-linear cryptanalysis revisited
- On the image of an affine subspace under the inverse function within a finite field
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
This page was built for publication: A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2948331)