Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
From MaRDI portal
Publication:2938844
DOI10.1007/978-3-662-45611-8_10zbMath1306.94035OpenAlexW1598147411MaRDI QIDQ2938844
Valentin Suder, María Naya-Plasencia, Christina Boura
Publication date: 16 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_10
Related Items (30)
PRINCEv2. More security for (almost) no overhead ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ A Higher Order Key Partitioning Attack with Application to LBlock ⋮ Weak rotational property and its application ⋮ Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks ⋮ Finding many collisions via reusable quantum walks. Application to lattice sieving ⋮ Quantum impossible differential attacks: applications to AES and SKINNY ⋮ New automatic search tool for searching for impossible differentials using undisturbed bits ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC ⋮ Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher ⋮ Impossible Differentials of SPN Ciphers ⋮ Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE ⋮ Bit-Based Division Property and Application to Simon Family ⋮ Note on Impossible Differential Attacks ⋮ Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques ⋮ Improving impossible-differential attacks against Rijndael-160 and Rijndael-224 ⋮ Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity ⋮ Making the impossible possible ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Improved Attacks on Reduced-Round Camellia-128/192/256 ⋮ Impossible Differential Cryptanalysis of 14-Round Camellia-192 ⋮ Improving key-recovery in linear attacks: application to 28-round PRESENT ⋮ On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis ⋮ Impossible differential attack on 13-round Camellia-192
This page was built for publication: Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon