Revisiting iterated attacks in the context of decorrelation theory
From MaRDI portal
Publication:458736
DOI10.1007/S12095-014-0101-XzbMATH Open1298.94081OpenAlexW2073411533MaRDI QIDQ458736FDOQ458736
Authors: Aslı Bay, Atefeh Mashatan, Serge Vaudenay
Publication date: 8 October 2014
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: http://infoscience.epfl.ch/record/203420
Recommendations
- Resistance against iterated attacks by decorrelation revisited
- Resistance against adaptive plaintext-ciphertext iterated distinguishers
- scientific article; zbMATH DE number 1304076
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- Protecting against multidimensional linear and truncated differential cryptanalysis by decorrelation
block ciphersboomerang distinguishersdecorrelation theorydifferential-linear distinguishersiterated attacks
Cites Work
- Probability Inequalities for Sums of Bounded Random Variables
- Perfect nonlinear S-boxes
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Small-Bias Probability Spaces: Efficient Constructions and Applications
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- Title not available (Why is that?)
- A Simple Parallel Algorithm for the Maximal Independent Set Problem
- Title not available (Why is that?)
- Decorrelation: a theory for block cipher security
- Title not available (Why is that?)
- Almost \(k\)-wise independence versus \(k\)-wise independence
- Title not available (Why is that?)
- Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers
- Resistance against iterated attacks by decorrelation revisited
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Proving the Security of AES Substitution-Permutation Network
- Dial C for Cipher
- KFC – The Krazy Feistel Cipher
Cited In (3)
This page was built for publication: Revisiting iterated attacks in the context of decorrelation theory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q458736)