On selection of samples in algebraic attacks and a new technique to find hidden low degree equations (original) (raw)

Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations

Shekh Faisal Abdul Latip

Proceedings of the 6th …, 2011

View PDFchevron_right

CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited

Nicolas Courtois

View PDFchevron_right

Combining Algebraic and Side-Channel Cryptanalysis against Block Ciphers

François-xavier Standaert

2009

View PDFchevron_right

Attacks on Block Ciphers of Low Algebraic Degree

Lars Knudsen

Journal of Cryptology, 2001

View PDFchevron_right

An Improvement of Linearization-Based Algebraic Attacks

Abhijit Abhik Das

Lecture Notes in Computer Science, 2011

View PDFchevron_right

How Fast Can Be Algebraic Attacks on Block Ciphers

Nicolas Courtois

online proceedings of Dagstuhl Seminar

View PDFchevron_right

Towards an Algebraic Attack on AES-128 Faster Than Brute-Force

Andrei Simion

2013

View PDFchevron_right

Algebraic and side-channel analysis of lightweight block ciphers

Shekh Faisal Abdul Latip

2012

View PDFchevron_right

Algebraic, aida/cube and side channel analysis of katan family of block ciphers

Nicolas Courtois

2010

View PDFchevron_right

Cryptanalysis of Block Ciphers with Overdefined Systems of Equations

Nicolas Courtois

Lecture Notes in Computer Science, 2002

View PDFchevron_right

Comparative Study of Algebraic Attacks

Ahmed Abdel-Hafez

IARJSET, 2016

View PDFchevron_right

Algebraic Attacks Galore!

Martin Kreuzer

Groups – Complexity – Cryptology, 2009

View PDFchevron_right

Counting equations in algebraic attacks on block ciphers

Lars Knudsen

International Journal of Information Security, 2010

View PDFchevron_right

Algebraic Attack Efficiency versus S-box Representation

Babak Sadeghiyan

IACR Cryptol. ePrint Arch., 2017

View PDFchevron_right

Algebraic Cryptanalysis of the Data Encryption Standard

Nicolas Courtois

Proceedings of the 11th IMA international …, 2007

View PDFchevron_right

General Principles of Algebraic Attacks and New Design Criteria for Cipher Components

Nicolas Courtois

Advanced Encryption Standard–AES, 2005

View PDFchevron_right

Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon

Nicolas Courtois

Proceedings of the 11th International Conference on Security and Cryptography, 2014

View PDFchevron_right

New Directions in Cryptanalysis of Block Ciphers

Davood Rezaeipour

Journal of Computer Science, 2009

View PDFchevron_right

New constructions in linear cryptanalysis of block ciphers

Zbigniew Kotulski

2000

View PDFchevron_right

Toward A More Efficient Gröbner-based Algebraic Cryptanalysis

Babak Sadeghiyan

IACR Cryptology ePrint Archive, 2019

View PDFchevron_right

General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers

Nicolas T. Courtois

AES 4 Conference, Bonn May 10-12 2004, LNCS 3373, 2005

View PDFchevron_right

Algebraic Cryptanalysis of Simplified AES∗

sean simmons

Cryptologia, 2009

View PDFchevron_right

Fourteen years of cube attacks

Silvia Onofri

Applicable Algebra in Engineering, Communication and Computing

View PDFchevron_right

Guess-and-Determine Attack and Algebraic Attack

pejman abdollahifard

2010

View PDFchevron_right

Algebraic Precomputations in Differential and Integral Cryptanalysis

Carlos Daniel Muñoz cid

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Cryptanalysis of block ciphers: A survey

Jean-jacques Quisquater

2003

View PDFchevron_right

Improvements of Algebraic Attacks Based on Structured Gaussian Elimination

Abhijit Abhik Das

View PDFchevron_right

On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers

Nicolas Courtois

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

The interpolation attack on block ciphers

Lars Knudsen

Lecture Notes in Computer Science, 1997

View PDFchevron_right

Rewriting variables: The complexity of fast algebraic attacks on stream ciphers

P. Hawkes

Advances in Cryptology–CRYPTO 2004, 2004

View PDFchevron_right

The Inverse S-Box, Non-Linear Polynomial Relations and Cryptanalysis of Block Ciphers

Nicolas Courtois

Advanced Encryption Standard–AES, 2005

View PDFchevron_right

Improved Linear Cryptanalysis of Round-Reduced ARIA

Mohamed Tolba

Lecture Notes in Computer Science, 2016

View PDFchevron_right

Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-310

Nicolas Courtois

Cryptologia, 2019

View PDFchevron_right

MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher

Riham AlTawy

Cryptography and Coding, 2017

View PDFchevron_right

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

ISECURE Journal

The ISC International Journal of Information Security, 2020

View PDFchevron_right