Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Publication:5311530

DOI10.1007/b99099zbMath1104.94018OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311530

Michaël Quisquater, Christophe De Cannière, Alex Biryukov

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items (41)

Cryptographic Analysis of All 4 × 4-Bit S-BoxesAnother look at normal approximations in cryptanalysisSEA: A Scalable Encryption Algorithm for Small Embedded ApplicationsCorrelation attacks on combination generatorsOn Linear Hulls and TrailsImproving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-methodEvolutionary cryptography against multidimensional linear cryptanalysisMultiple (truncated) differential cryptanalysis: explicit upper bounds on data complexityRevisiting the wrong-key-randomization hypothesisDifferential-linear cryptanalysis revisitedRigorous upper bounds on data complexities of block cipher cryptanalysisAutomatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECKZero-correlation linear cryptanalysis of reduced-round LBlockGeneralization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphersWeak rotational property and its applicationA geometric approach to linear cryptanalysisLinear Distinguishing Attack on ShannonImproved truncated differential distinguishers of AES with concrete S-boxOptimising linear key recovery attacks with affine Walsh transform pruningQuantum linear key-recovery attacks using the QFTExperiments on the Multiple Linear Cryptanalysis of Reduced Round SerpentMultidimensional linear cryptanalysisLombardi Drawings of Knots and LinksMultidimensional linear distinguishing attacks and Boolean functionsImproved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing TechniquesJoint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexitySuccess probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypothesesOn probability of success in linear and differential cryptanalysisImproved and Multiple Linear Cryptanalysis of Reduced Round SerpentDifferential-Multiple Linear CryptanalysisLinear Cryptanalysis of Non Binary CiphersOn quadratic approximations in block ciphersA Statistical Saturation Attack against the Block Cipher PRESENTCryptanalysis of CTC2Provable security of block ciphers against linear cryptanalysis: a mission impossible?A Unified Framework for the Analysis of Side-Channel Key Recovery AttacksМногомерный линейный метод и показатели рассеивания линейной среды шифрпреобразованийInternal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}Improving key-recovery in linear attacks: application to 28-round PRESENTThe Cryptanalysis of Reduced-Round SMS4Критерии проверки гипотезы о наличии зашумленной функциональной зависимости между случайными двоичными векторами и битами




This page was built for publication: Advances in Cryptology – CRYPTO 2004