Distinguishing error of nonlinear invariant attacks
From MaRDI portal
Publication:6169470
Recommendations
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Topics in Cryptology – CT-RSA 2006
- Systematic construction of nonlinear product attacks on block ciphers
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Block cipher invariants as eigenvectors of correlation matrices
Cites work
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma
- A simplified representation of AES
- An overview of distinguishing attacks on stream ciphers
- How Far Can We Go Beyond Linear Cryptanalysis?
- Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials
- Known-Key Distinguishers for Some Block Ciphers
- Multiple limited-birthday distinguishers and applications
- New cube distinguishers on NFSR-based stream ciphers
- Non-linear approximations in linear cryptanalysis
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Progress in Cryptology – Mycrypt 2005
- Revisiting Gilbert's known-key distinguisher
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
Cited in
(5)- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Invalid curve attacks in a GLS setting
- Systematic construction of nonlinear product attacks on block ciphers
- Giophantus distinguishing attack is a low dimensional learning with errors problem
This page was built for publication: Distinguishing error of nonlinear invariant attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6169470)