CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited (original) (raw)
Related papers
How Fast Can Be Algebraic Attacks on Block Ciphers
online proceedings of Dagstuhl Seminar
New constructions in linear cryptanalysis of block ciphers
2000
Attacks on Block Ciphers of Low Algebraic Degree
Journal of Cryptology, 2001
Algebraic and side-channel analysis of lightweight block ciphers
2012
Combining Algebraic and Side-Channel Cryptanalysis against Block Ciphers
2009
The Key-Dependent Attack on Block Ciphers
Lecture Notes in Computer Science, 2009
A New Type of Attacks on Block Ciphers
Problems of Information Transmission, 2005
Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Designs, Codes and Cryptography, 2009
The interpolation attack on block ciphers
Lecture Notes in Computer Science, 1997
Cryptanalysis of block ciphers: A survey
2003
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
Advanced Encryption StandardAES, 2005
Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
Advances in CryptologyCRYPTO 2004, 2004
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
International Journal of Information Security, 2015
Algebraic Cryptanalysis of the Data Encryption Standard
Proceedings of the 11th IMA international …, 2007
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt
Proceedings of the 5th international conference on …, 2002
Block Ciphers – Focus On The Linear Layer (feat. PRIDE
An argument on the security of LRBC, a recently proposed lightweight block cipher
IACR Cryptol. ePrint Arch., 2020
New Directions in Cryptanalysis of Block Ciphers
Journal of Computer Science, 2009
General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers
AES 4 Conference, Bonn May 10-12 2004, LNCS 3373, 2005
Lecture Notes in Computer Science
Algebraic cryptanalysis of a small-scale version of stream cipher Lex
IET Information Security, 2010
IACR Cryptol. ePrint Arch., 2018
Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
IACR Cryptology ePrint Archive, 2013
A Related Key Attack on the Feistel Type Block Ciphers
International Journal of Network Security, 2009
On Practical Second-Order Power Analysis Attacks for Block Ciphers
Lecture Notes in Computer Science, 2010
Counting equations in algebraic attacks on block ciphers
International Journal of Information Security, 2010
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds
Periodic ciphers with small blocks and cryptanalysis of keeloq
Tatra Mountains …, 2008
Towards an Algebraic Attack on AES-128 Faster Than Brute-Force
2013
Block Ciphers-Focus On The Linear Layer (feat. PRIDE): Full Version
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Lecture Notes in Computer Science, 2002
A New Meet-In-the-Middle Attack on the IDEA Block Cipher
Selected Areas in Cryptography, 2004