Can a differential attack work for an arbitrarily large number of rounds?
From MaRDI portal
Publication:831646
DOI10.1007/978-3-030-68890-5_9OpenAlexW3126622432MaRDI QIDQ831646
Jean-Jacques Quisquater, Nicolas T. Courtois
Publication date: 24 March 2022
Full work available at URL: https://discovery.ucl.ac.uk/id/eprint/10133641/
Boolean functionsmultivariate polynomialsannihilatorspolynomial invariantsalgebraic cryptanalysisFeistel ciphersgeneralized linear cryptanalysishidden polynomial problemsk-normalityMarkov ciphersT-310
Related Items (2)
Rotational analysis of ChaCha permutation ⋮ On weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of Enigma
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Systematic construction of nonlinear product attacks on block ciphers
- Differential cryptanalysis of DES-like cryptosystems
- The multiplicative complexity of 6-variable Boolean functions
- Normal Boolean functions
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Aggregated differentials and cryptanalysis of PP-1 and GOST
- A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma
- Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants
- An Improved Differential Attack on Full GOST
- Non-Linear Approximations in Linear Cryptanalysis
- Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq
- Nonlinear Invariant Attack
- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
- Comparison of Cube Attacks Over Different Vector Spaces
- Algebraic and Slide Attacks on KeeLoq
- Markov Ciphers and Differential Cryptanalysis
- Partitioning cryptanalysis
- Contradiction Immunity and Guess-Then-Determine Attacks on Gost
- Cryptanalytic Attacks on MIFARE Classic Protocol
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- A Classification of the Cosets of the Reed-Muller Code R (1, 6)
- Advances in Cryptology – CRYPTO 2004
- Advanced Encryption Standard – AES
This page was built for publication: Can a differential attack work for an arbitrarily large number of rounds?