A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro

From MaRDI portal
Publication:2948331

DOI10.1007/978-3-662-46800-5_11zbMath1370.94525OpenAlexW2111902481MaRDI QIDQ2948331

Brice Minaud, Gregor Leander, Sondre Rønjom

Publication date: 30 September 2015

Published in: Advances in Cryptology -- EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46800-5_11




Related Items (24)

On the resilience of Even-Mansour to invariant permutations\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsA new non-random property of 4.5-round PRINCEWeak-key distinguishers for AESPractical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCENew observations on invariant subspace attackRotational differential-linear cryptanalysis revisitedNonlinear Invariant AttackOn the primitivity of the AES-128 key-scheduleFUTURE: a lightweight block cipher using an optimal diffusion matrixOn the image of an affine subspace under the inverse function within a finite fieldCryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}Improving the security and efficiency of block ciphers based on LS-designsDifferential-linear and related key cryptanalysis of round-reduced screamNonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64Cryptanalysis of \texttt{NORX} v2.0Cryptographic properties of cyclic binary matricesOn invariant subspaces in the Lai-Massey scheme and a primitivity reductionВлияние приводимости линейного преобразования на выбор раундовых константThe permutation group insight on the diffusion property of linear mappingsХарактеризация отображений через свойство неизометричностиNew representations of the AES key scheduleRotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}More accurate results on the provable security of AES against impossible differential cryptanalysis


Uses Software





This page was built for publication: A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro