Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311530
DOI10.1007/B99099zbMATH Open1104.94018OpenAlexW2477011922MaRDI QIDQ5311530FDOQ5311530
Authors: Alex Biryukov, Christophe De Cannière, Michaël Quisquater
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
Recommendations
DESlinear cryptanalysismaximum likelihood decodingAESmultiple linear approximationskey-rankingstochastic systems of linear equations
Cited In (55)
- Improving linear key recovery attacks using Walsh spectrum puncturing
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A geometric approach to linear cryptanalysis
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- The Independence of Linear Approximations in Symmetric Cryptanalysis
- The Cryptanalysis of Reduced-Round SMS4
- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- Differential-multiple linear cryptanalysis
- Linear cryptanalysis using multiple linear approximations
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
- Estimating resistance against multidimensional linear attacks: an application on DEAN
- Differential-linear cryptanalysis revisited
- Title not available (Why is that?)
- Quantum speed-up for multidimensional (zero correlation) linear distinguishers
- Another look at normal approximations in cryptanalysis
- Improved truncated differential distinguishers of AES with concrete S-box
- Linear Cryptanalysis of Non Binary Ciphers
- Multidimensional linear cryptanalysis
- Multidimensional linear method and diffusion characteristics of linear medium of ciphering transform
- Optimising linear key recovery attacks with affine Walsh transform pruning
- A Statistical Saturation Attack against the Block Cipher PRESENT
- On linear hulls and trails
- Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity
- Provable security of block ciphers against linear cryptanalysis: a mission impossible?
- Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK
- Cryptanalysis of CTC2
- Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method
- Quantum linear key-recovery attacks using the QFT
- Weak rotational property and its application
- Utilizing FWT in linear cryptanalysis of block ciphers with various structures
- Rigorous upper bounds on data complexities of block cipher cryptanalysis
- Correlation attacks on combination generators
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- Критерии проверки гипотезы о наличии зашумленной функциональной зависимости между случайными двоичными векторами и битами
- Lombardi drawings of knots and links
- Revisiting the wrong-key-randomization hypothesis
- Evolutionary cryptography against multidimensional linear cryptanalysis
- Dependent linear approximations: the algorithm of Biryukov and others revisited
- On probability of success in linear and differential cryptanalysis
- Linear Distinguishing Attack on Shannon
- Linear cryptanalysis of DES with asymmetries
- Multidimensional linear distinguishing attacks and Boolean functions
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers
- Multirational function approximation via linear programming
- On quadratic approximations in block ciphers
- On linear cryptanalysis with many linear approximations
- Multidimensional Extension of Matsui’s Algorithm 2
- On unbiased linear approximations
This page was built for publication: Advances in Cryptology – CRYPTO 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5311530)