Nonlinear Invariant Attack
From MaRDI portal
Publication:2953771
DOI10.1007/978-3-662-53890-6_1zbMath1380.94126OpenAlexW2549924696MaRDI QIDQ2953771
Yu Sasaki, Gregor Leander, Yosuke Todo
Publication date: 6 January 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_1
Boolean functionCAESAR competitionnonlinear invariant attackciphertext-only message-recovery attackiSCREAMMidori64SCREAM
Related Items
On the resilience of Even-Mansour to invariant permutations, \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations, Can a differential attack work for an arbitrarily large number of rounds?, A new non-random property of 4.5-round PRINCE, On the existence of special nonlinear invariants for round functions of XSL-ciphers, A theoretical analysis of generalized invariants of bijective S-boxes, A geometric approach to linear cryptanalysis, On degree-\(d\) zero-sum sets of full rank, Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis, Differential-linear and related key cryptanalysis of round-reduced scream, Block cipher invariants as eigenvectors of correlation matrices, Troika: a ternary cryptographic hash function, More accurate results on the provable security of AES against impossible differential cryptanalysis, Improved differential-linear attacks with applications to ARX ciphers, Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX), New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tweakable block ciphers
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma
- Midori: A Block Cipher for Low Energy
- Non-Linear Approximations in Linear Cryptanalysis
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- Multidimensional Linear Cryptanalysis of Reduced Round Serpent
- Another Look at Complementation Properties
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Advanced Encryption Standard – AES