Higher Order Derivatives and Differential Cryptanalysis
From MaRDI portal
Publication:4857242
DOI10.1007/978-1-4615-2694-0_23zbMath0840.94017OpenAlexW37385681WikidataQ29400839 ScholiaQ29400839MaRDI QIDQ4857242
Publication date: 4 July 1996
Published in: Communications and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-1-4615-2694-0_23
differential cryptanalysisapplications of derivatives in cryptologyhigh-order derivatives of multi-variable functions
Related Items (77)
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions ⋮ On various nonlinearity measures for Boolean functions ⋮ Conditional Differential Cryptanalysis of Trivium and KATAN ⋮ SQUARE attack on block ciphers with low algebraic degree ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ Applying cube attacks to stream ciphers in realistic scenarios ⋮ Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis ⋮ Integral Cryptanalysis on Full MISTY1 ⋮ Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE ⋮ Comparison of Cube Attacks Over Different Vector Spaces ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ Cryptanalysis of two white-box implementations of the SM4 block cipher ⋮ Survey on recent trends towards generalized differential and boomerang uniformities ⋮ Capability of evolutionary cryptosystems against differential cryptanalysis ⋮ Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity ⋮ Higher order differentiation over finite fields with applications to generalising the cube attack ⋮ Differential-linear cryptanalysis revisited ⋮ Integral cryptanalysis on full MISTY1 ⋮ Rigorous upper bounds on data complexities of block cipher cryptanalysis ⋮ Efficient quantum algorithms related to autocorrelation spectrum ⋮ Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks ⋮ On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions ⋮ Constructive Relationships Between Algebraic Thickness and Normality ⋮ On the security of multivariate hash functions ⋮ Differential uniformity and second order derivatives for generic polynomials ⋮ Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks ⋮ Further constructions and characterizations of generalized almost perfect nonlinear functions ⋮ Probabilistic estimation of the algebraic degree of Boolean functions ⋮ Truncated differential properties of the diagonal set of inputs for 5-round AES ⋮ Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks ⋮ Cryptanalysis of Ciminion ⋮ On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC ⋮ Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ Mathematical aspects of division property ⋮ Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting ⋮ Coefficient grouping for complex affine layers ⋮ Cubic bent functions outside the completed Maiorana-McFarland class ⋮ Counting Boolean functions with faster points ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ Lower bounds on the degree of block ciphers ⋮ Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions ⋮ The phantom of differential characteristics ⋮ The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ Literature survey on nonlinear components and chaotic nonlinear components of block ciphers ⋮ Second order collision for the 42-step reduced DHA-256 hash function ⋮ \(N\)-dimensional binary vector spaces ⋮ Finding integral distinguishers with ease ⋮ The interpolation attack on block ciphers ⋮ Higher Order Differential Attack of a CAST Cipher ⋮ Bit-Based Division Property and Application to Simon Family ⋮ Орбитальные производные над кольцом вычетов. Часть I. Общие свойства ⋮ Орбитальные производные над кольцом вычетов. Часть II. Вероятностно-комбинаторные свойства ⋮ Counting and characterising functions with ``fast points for differential attacks ⋮ Breaking Grain-128 with Dynamic Cube Attacks ⋮ New generalized almost perfect nonlinear functions ⋮ Packed Ciphertexts in LWE-Based Homomorphic Encryption ⋮ Involutory differentially 4-uniform permutations from known constructions ⋮ Conditional Cube Attack on Reduced-Round Keccak Sponge Function ⋮ Concatenating indicators of flats for designing cryptographic functions ⋮ Results on rotation-symmetric S-boxes ⋮ Distinguishing properties and applications of higher order derivatives of Boolean functions ⋮ Key Recovery on Hidden Monomial Multivariate Schemes ⋮ Modeling for three-subset division property without unknown subset ⋮ Multiset structural attack on generalized Feistel networks ⋮ Discrete antiderivatives for functions over \(\mathbb{F}_p^n\) ⋮ Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD ⋮ Low order approximation of cipher functions ⋮ Boomerang Distinguisher for the SIMD-512 Compression Function ⋮ New Insights on AES-Like SPN Ciphers ⋮ Another View of the Division Property ⋮ On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions ⋮ 3D: A Three-Dimensional Block Cipher ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems ⋮ Difference of function on vector space over \(\mathbb F\) ⋮ Algorithm 959
This page was built for publication: Higher Order Derivatives and Differential Cryptanalysis