Revisiting iterated attacks in the context of decorrelation theory
From MaRDI portal
(Redirected from Publication:458736)
Recommendations
- Resistance against iterated attacks by decorrelation revisited
- Resistance against adaptive plaintext-ciphertext iterated distinguishers
- scientific article; zbMATH DE number 1304076
- On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
- Protecting against multidimensional linear and truncated differential cryptanalysis by decorrelation
Cites work
- scientific article; zbMATH DE number 1583951 (Why is no real title available?)
- scientific article; zbMATH DE number 1304076 (Why is no real title available?)
- scientific article; zbMATH DE number 1304104 (Why is no real title available?)
- scientific article; zbMATH DE number 1088929 (Why is no real title available?)
- scientific article; zbMATH DE number 1136079 (Why is no real title available?)
- scientific article; zbMATH DE number 1504535 (Why is no real title available?)
- scientific article; zbMATH DE number 1406763 (Why is no real title available?)
- scientific article; zbMATH DE number 1418251 (Why is no real title available?)
- scientific article; zbMATH DE number 1440880 (Why is no real title available?)
- A Simple Parallel Algorithm for the Maximal Independent Set Problem
- Almost \(k\)-wise independence versus \(k\)-wise independence
- Decorrelation: a theory for block cipher security
- Dial C for Cipher
- How to Construct Pseudorandom Permutations from Pseudorandom Functions
- KFC – The Krazy Feistel Cipher
- New hash functions and their use in authentication and set equality
- Perfect nonlinear S-boxes
- Probability Inequalities for Sums of Bounded Random Variables
- Proving the Security of AES Substitution-Permutation Network
- Resistance against adaptive plaintext-ciphertext iterated distinguishers
- Resistance against iterated attacks by decorrelation revisited
- Small-Bias Probability Spaces: Efficient Constructions and Applications
- Universal classes of hash functions
Cited in
(4)
This page was built for publication: Revisiting iterated attacks in the context of decorrelation theory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q458736)