Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma - MaRDI portal

A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma

From MaRDI portal
Publication:2757230

DOI10.1007/3-540-49264-X_3zbMath0973.94522OpenAlexW1564295073MaRDI QIDQ2757230

Carlo Harpes, Gerhard G. Kramer, James L. Massey

Publication date: 25 November 2001

Published in: Advances in Cryptology — EUROCRYPT ’95 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-49264-x_3




Related Items (27)

Can a differential attack work for an arbitrarily large number of rounds?Another look at normal approximations in cryptanalysisCapacity and Data Complexity in Multidimensional Linear AttackRevisiting the wrong-key-randomization hypothesisRigorous upper bounds on data complexities of block cipher cryptanalysisOn the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2Another look at key randomisation hypothesesNonlinear Invariant AttackA theoretical analysis of generalized invariants of bijective S-boxesA geometric approach to linear cryptanalysisDistinguishing error of nonlinear invariant attacksAccurate estimates of the data complexity and success probability for various cryptanalysesOn degree-\(d\) zero-sum sets of full rankMultidimensional linear cryptanalysisUpper estimates of imbalance of bilinear approximations for round functions of block ciphersPartitioning cryptanalysisNon-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystemsMultiple Differential Cryptanalysis: Theory and PracticeSuccess probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypothesesNonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64Correlation theorems in cryptanalysisNon-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-BoxesLinear Cryptanalysis of Non Binary CiphersOn quadratic approximations in block ciphersA Statistical Saturation Attack against the Block Cipher PRESENTProvable security of block ciphers against linear cryptanalysis: a mission impossible?Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis




This page was built for publication: A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma