Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Higher-Order Differential Properties of Keccak and Luffa - MaRDI portal

Higher-Order Differential Properties of Keccak and Luffa

From MaRDI portal
Publication:3013088

DOI10.1007/978-3-642-21702-9_15zbMath1307.94040OpenAlexW2101800793MaRDI QIDQ3013088

Christophe De Cannière, Christina Boura, Anne Canteaut

Publication date: 7 July 2011

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_15




Related Items (32)

Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functionsMeet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsNew Results on the SymSum Distinguisher on Round-Reduced SHA3LHash: A Lightweight Hash FunctionCryptanalysis of round-reduced KECCAK using non-linear structuresCoefficient grouping: breaking Chaghri and moreConditional Cube Searching and Applications on Trivium-Variant CiphersLinear Structures: Applications to Cryptanalysis of Round-Reduced KeccakOn the field-based division property: applications to MiMC, Feistel MiMC and GMiMCDEFAULT: cipher level resistance against differential fault attackMathematical aspects of division propertyFull round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key settingCoefficient grouping for complex affine layers\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applicationsAn algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sumsAn algebraic attack on ciphers with low-degree round functions: application to full MiMCLower bounds on the degree of block ciphersUnnamed ItemImproved cryptanalysis of AES-like permutationsОрбитальные производные над кольцом вычетов. Часть I. Общие свойстваImproving the security and efficiency of block ciphers based on LS-designsCryptanalysis of AsconDistinguishing properties and applications of higher order derivatives of Boolean functions\textsc{Ascon} v1.2: lightweight authenticated encryption and hashingImproved practical attacks on round-reduced KeccakOn some properties of an XSL-network\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fieldsPractical Analysis of Reduced-Round KeccakAnother View of the Division PropertyRevisiting Gilbert's known-key distinguisherOut of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems


Uses Software


Cites Work


This page was built for publication: Higher-Order Differential Properties of Keccak and Luffa