Distinguishing error of nonlinear invariant attacks
From MaRDI portal
Publication:6169470
DOI10.1007/978-3-031-22912-1_14zbMATH Open1519.94185OpenAlexW2898774870MaRDI QIDQ6169470FDOQ6169470
Authors: Subhabrata Samajder, Palash Sarkar
Publication date: 14 August 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22912-1_14
Recommendations
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Topics in Cryptology – CT-RSA 2006
- Systematic construction of nonlinear product attacks on block ciphers
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Block cipher invariants as eigenvectors of correlation matrices
Applications of statistics (62P99) Data encryption (aspects in computer science) (68P25) Cryptography (94A60)
Cites Work
- Non-linear approximations in linear cryptanalysis
- Title not available (Why is that?)
- A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma
- How Far Can We Go Beyond Linear Cryptanalysis?
- Known-Key Distinguishers for Some Block Ciphers
- An overview of distinguishing attacks on stream ciphers
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- A simplified representation of AES
- Multiple limited-birthday distinguishers and applications
- Revisiting Gilbert's known-key distinguisher
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- New cube distinguishers on NFSR-based stream ciphers
- Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials
- Progress in Cryptology – Mycrypt 2005
Cited In (5)
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Invalid curve attacks in a GLS setting
- Systematic construction of nonlinear product attacks on block ciphers
- Giophantus distinguishing attack is a low dimensional learning with errors problem
This page was built for publication: Distinguishing error of nonlinear invariant attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6169470)