Another look at normal approximations in cryptanalysis
From MaRDI portal
Publication:293721
DOI10.1515/jmc-2016-0006zbMath1408.94962OpenAlexW2395125404MaRDI QIDQ293721
Subhabrata Samajder, Palash Sarkar
Publication date: 9 June 2016
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2016-0006
order statisticsblock ciphernormal distributiondifferential cryptanalysislinear cryptanalysisBerry-Esséen theorem
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Applications of statistics (62P99)
Related Items (5)
Rigorous upper bounds on data complexities of block cipher cryptanalysis ⋮ Another look at key randomisation hypotheses ⋮ Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes ⋮ Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses ⋮ On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- Dependence of the Berry-Esseen estimate on the dimension
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- On probability of success in linear and differential cryptanalysis
- A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma
- Bounds in Shallows and in Miseries
- Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics
- On the Distribution of Linear Biases: Three Instructive Examples
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2
- On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN
- Multiple Differential Cryptanalysis: Theory and Practice
- A Practical Attack on Broadcast RC4
- Refinement of the upper bounds of the constants in Lyapunov's theorem
- Multidimensional Extension of Matsui’s Algorithm 2
- The Independence of Linear Approximations in Symmetric Cryptanalysis
- Power Approximations to Multinomial Tests of Fit
- Distinguishing Distributions Using Chernoff Information
- Advances in Cryptology – CRYPTO 2004
- Probability distributions of correlation and differentials in block ciphers
- How Far Can We Go Beyond Linear Cryptanalysis?
- Fast Software Encryption
This page was built for publication: Another look at normal approximations in cryptanalysis