Higher Order Derivatives and Differential Cryptanalysis

From MaRDI portal
Publication:4857242

DOI10.1007/978-1-4615-2694-0_23zbMath0840.94017OpenAlexW37385681WikidataQ29400839 ScholiaQ29400839MaRDI QIDQ4857242

Xuejia Lai

Publication date: 4 July 1996

Published in: Communications and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-1-4615-2694-0_23




Related Items (77)

Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functionsOn various nonlinearity measures for Boolean functionsConditional Differential Cryptanalysis of Trivium and KATANSQUARE attack on block ciphers with low algebraic degreeThe \(t\)-wise independence of substitution-permutation networksApplying cube attacks to stream ciphers in realistic scenariosLinks Among Impossible Differential, Integral and Zero Correlation Linear CryptanalysisIntegral Cryptanalysis on Full MISTY1Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKEComparison of Cube Attacks Over Different Vector SpacesCorrelation cube attacks: from weak-key distinguisher to key recoveryCryptanalysis of two white-box implementations of the SM4 block cipherSurvey on recent trends towards generalized differential and boomerang uniformitiesCapability of evolutionary cryptosystems against differential cryptanalysisMultiple (truncated) differential cryptanalysis: explicit upper bounds on data complexityHigher order differentiation over finite fields with applications to generalising the cube attackDifferential-linear cryptanalysis revisitedIntegral cryptanalysis on full MISTY1Rigorous upper bounds on data complexities of block cipher cryptanalysisEfficient quantum algorithms related to autocorrelation spectrumImproving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube AttacksOn the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN FunctionsConstructive Relationships Between Algebraic Thickness and NormalityOn the security of multivariate hash functionsDifferential uniformity and second order derivatives for generic polynomialsFinding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacksFurther constructions and characterizations of generalized almost perfect nonlinear functionsProbabilistic estimation of the algebraic degree of Boolean functionsTruncated differential properties of the diagonal set of inputs for 5-round AESQuantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networksCryptanalysis of CiminionOn the field-based division property: applications to MiMC, Feistel MiMC and GMiMCCryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphersMathematical aspects of division propertyFull round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key settingCoefficient grouping for complex affine layersCubic bent functions outside the completed Maiorana-McFarland classCounting Boolean functions with faster pointsAn algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sumsAn algebraic attack on ciphers with low-degree round functions: application to full MiMCLower bounds on the degree of block ciphersConstructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functionsThe phantom of differential characteristicsThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherLiterature survey on nonlinear components and chaotic nonlinear components of block ciphersSecond order collision for the 42-step reduced DHA-256 hash function\(N\)-dimensional binary vector spacesFinding integral distinguishers with easeThe interpolation attack on block ciphersHigher Order Differential Attack of a CAST CipherBit-Based Division Property and Application to Simon FamilyОрбитальные производные над кольцом вычетов. Часть I. Общие свойстваОрбитальные производные над кольцом вычетов. Часть II. Вероятностно-комбинаторные свойстваCounting and characterising functions with ``fast points for differential attacksBreaking Grain-128 with Dynamic Cube AttacksNew generalized almost perfect nonlinear functionsPacked Ciphertexts in LWE-Based Homomorphic EncryptionInvolutory differentially 4-uniform permutations from known constructionsConditional Cube Attack on Reduced-Round Keccak Sponge FunctionConcatenating indicators of flats for designing cryptographic functionsResults on rotation-symmetric S-boxesDistinguishing properties and applications of higher order derivatives of Boolean functionsKey Recovery on Hidden Monomial Multivariate SchemesModeling for three-subset division property without unknown subsetMultiset structural attack on generalized Feistel networksDiscrete antiderivatives for functions over \(\mathbb{F}_p^n\)Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEADLow order approximation of cipher functionsBoomerang Distinguisher for the SIMD-512 Compression FunctionNew Insights on AES-Like SPN CiphersAnother View of the Division PropertyOn the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions3D: A Three-Dimensional Block CipherOut of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systemsDifference of function on vector space over \(\mathbb F\)Algorithm 959




This page was built for publication: Higher Order Derivatives and Differential Cryptanalysis