Probability distributions of correlation and differentials in block ciphers

From MaRDI portal
Publication:5443535


DOI10.1515/JMC.2007.011zbMath1211.94028WikidataQ123231092 ScholiaQ123231092MaRDI QIDQ5443535

Vincent Rijmen, Joan Daemen

Publication date: 21 February 2008

Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)


94A60: Cryptography

68P25: Data encryption (aspects in computer science)


Related Items

Another look at key randomisation hypotheses, Quantum attacks on beyond-birthday-bound MACs, Quantum linear key-recovery attacks using the QFT, Another look at normal approximations in cryptanalysis, Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity, Provable security of block ciphers against linear cryptanalysis: a mission impossible?, Differential attacks: using alternative operations, Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses, Improving key-recovery in linear attacks: application to 28-round PRESENT, Quantum algorithms for learning Walsh spectra of multi-output Boolean functions, Improved BV-based quantum attack on block ciphers, Linear cryptanalysis of FF3-1 and FEA, Revisiting the wrong-key-randomization hypothesis, Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations, Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis, Linear hulls with correlation zero and linear cryptanalysis of block ciphers, Applications of Simon's algorithm in quantum attacks on Feistel variants, Breaking Symmetric Cryptosystems Using Quantum Period Finding, On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2, Multiple Differential Cryptanalysis: Theory and Practice, Спектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметров, On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure, Capacity and Data Complexity in Multidimensional Linear Attack



Cites Work