Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon - MaRDI portal

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon

From MaRDI portal
Publication:2938844

DOI10.1007/978-3-662-45611-8_10zbMath1306.94035OpenAlexW1598147411MaRDI QIDQ2938844

Valentin Suder, María Naya-Plasencia, Christina Boura

Publication date: 16 January 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_10




Related Items (30)

PRINCEv2. More security for (almost) no overheadWARP: revisiting GFN for lightweight 128-bit block cipherRelated-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3Key guessing strategies for linear key-schedule algorithms in rectangle attacksA Higher Order Key Partitioning Attack with Application to LBlockWeak rotational property and its applicationFinding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacksFinding many collisions via reusable quantum walks. Application to lattice sievingQuantum impossible differential attacks: applications to AES and SKINNYNew automatic search tool for searching for impossible differentials using undisturbed bitsMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsImpossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BCImproved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block CipherImpossible Differentials of SPN CiphersAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINEBit-Based Division Property and Application to Simon FamilyNote on Impossible Differential AttacksImproved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing TechniquesImproving impossible-differential attacks against Rijndael-160 and Rijndael-224Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexityMaking the impossible possibleBlock cipher invariants as eigenvectors of correlation matricesImproved Attacks on Reduced-Round Camellia-128/192/256Impossible Differential Cryptanalysis of 14-Round Camellia-192Improving key-recovery in linear attacks: application to 28-round PRESENTOn the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon VariantsAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksProvable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structuresMore accurate results on the provable security of AES against impossible differential cryptanalysisImpossible differential attack on 13-round Camellia-192




This page was built for publication: Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon