Algebraic and Slide Attacks on KeeLoq
From MaRDI portal
Publication:3525663
DOI10.1007/978-3-540-71039-4_6zbMath1154.68388OpenAlexW1870923733MaRDI QIDQ3525663
David Wagner, Gregory V. Bard, Nicolas T. Courtois
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_6
Gröbner basesblock ciphersalgebraic cryptanalysisSAT solversslide attacksKeeLoqunbalanced Feistel ciphers
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Data encryption (aspects in computer science) (68P25)
Related Items (22)
Stream/block ciphers, difference equations and algebraic attacks ⋮ Can a differential attack work for an arbitrarily large number of rounds? ⋮ Aggregated differentials and cryptanalysis of PP-1 and GOST ⋮ Mutant Differential Fault Analysis of Trivium MDFA ⋮ Algebraic Attacks Using Binary Decision Diagrams ⋮ A practical attack on KeeLoq ⋮ Sparse Boolean equations and circuit lattices ⋮ Algebraic and Slide Attacks on KeeLoq ⋮ Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator ⋮ On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions ⋮ Observing biases in the state: case studies with Trivium and Trivia-SC ⋮ On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme ⋮ Linear Slide Attacks on the KeeLoq Block Cipher ⋮ Algebraic Cryptanalysis of the Data Encryption Standard ⋮ A Practical Attack on KeeLoq ⋮ Cryptanalysis of CTC2 ⋮ A Leakage-Resilient Mode of Operation ⋮ Practical Algebraic Attacks on the Hitag2 Stream Cipher ⋮ Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts ⋮ Reflection Cryptanalysis of Some Ciphers ⋮ Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition ⋮ Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages
Uses Software
Cites Work
- A new efficient algorithm for computing Gröbner bases \((F_4)\)
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- Perfect Block Ciphers with Small Blocks
- Algebraic and Slide Attacks on KeeLoq
- Linear Slide Attacks on the KeeLoq Block Cipher
- An Analysis of the Hermes8 Stream Ciphers
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Advanced Encryption Standard – AES
- Algebraic Cryptanalysis of the Data Encryption Standard
- A Practical Attack on KeeLoq
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Algebraic and Slide Attacks on KeeLoq