Optimising linear key recovery attacks with affine Walsh transform pruning
From MaRDI portal
Publication:6175986
Recommendations
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- Affine linear cryptanalysis
- Linear distinguishers in the key-less setting: application to PRESENT
- Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK
- How Much Can Complexity of Linear Cryptanalysis Be Reduced?
Cites work
- scientific article; zbMATH DE number 708826 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1406761 (Why is no real title available?)
- scientific article; zbMATH DE number 1406763 (Why is no real title available?)
- A novel generic fast Fourier transform pruning technique and complexity analysis
- Advances in Cryptology – CRYPTO 2004
- An Algorithm for the Machine Calculation of Complex Fourier Series
- Boolean functions for cryptography and coding theory
- Differential-linear cryptanalysis of Serpent.
- Efficient computation of the DFT with only a subset of input or output points
- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
- Generic framework for key-guessing improvements
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- Improving the Time Complexity of Matsui’s Linear Cryptanalysis
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Linear cryptanalysis of DES with asymmetries
- Linear cryptanalysis of reduced-round PRESENT
- Multidimensional linear cryptanalysis
- On probability of success in linear and differential cryptanalysis
- PRESENT: An Ultra-Lightweight Block Cipher
Cited in
(6)- Improving key-recovery in linear attacks: application to 28-round PRESENT
- Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Improving linear key recovery attacks using Walsh spectrum puncturing
- Utilizing FWT in linear cryptanalysis of block ciphers with various structures
- Quantum linear key-recovery attacks using the QFT
This page was built for publication: Optimising linear key recovery attacks with affine Walsh transform pruning
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6175986)