Extended truncated-differential distinguishers on round-reduced AES
Distinguishers on round-reduced AES have attracted considerable attention in the recent
years. While the number of rounds covered in key-recovery attacks did not increase …
years. While the number of rounds covered in key-recovery attacks did not increase …
[PDF][PDF] Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve cryptography
Cryptanalysis is the investigation of cipher content, ciphers and cryptosystems with the point
of seeing how they work and finding and improving procedures for crushing or debilitating …
of seeing how they work and finding and improving procedures for crushing or debilitating …
Towards closing the security gap of Tweak-aNd-Tweak (TNT)
Tweakable block ciphers (TBCs) have been established as a valuable replacement for many
applications of classical block ciphers. While several dedicated TBCs have been proposed …
applications of classical block ciphers. While several dedicated TBCs have been proposed …
Improved Truncated Differential Distinguishers of AES with Concrete S-Box
C Chang, M Wang, L Sun, W Wang - International Conference on …, 2022 - Springer
Abstract The security of Advanced Encryption Standard (AES) is one of the most important
issues in cryptanalysis. In ToSC 2020, Bao et al. proposed an open question about the …
issues in cryptanalysis. In ToSC 2020, Bao et al. proposed an open question about the …
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
G Paul, S Ray - Designs, Codes and Cryptography, 2018 - Springer
We revisit the different approaches used in the literature to estimate the data complexity of
distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process …
distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process …
Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
S Samajder, P Sarkar - Cryptography and Communications, 2018 - Springer
This work considers statistical analysis of attacks on block cyphers using several linear
approximations. A general and unified approach is adopted. To this end, the general key …
approximations. A general and unified approach is adopted. To this end, the general key …
Another look at success probability in linear cryptanalysis
S Samajder, P Sarkar - Cryptology ePrint Archive, 2017 - eprint.iacr.org
This work studies the success probability of key recovery attacks based on using a single
linear approximation. Previous works had analysed success probability under different …
linear approximation. Previous works had analysed success probability under different …
Can Large Deviation Theory be Used for Estimating Data Complexity?
S Samajder, P Sarkar - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Statistical analysis of attacks on block ciphers have mostly used normal approximations. A
few recent works have proposed doing away with normal approximations and instead use …
few recent works have proposed doing away with normal approximations and instead use …
Неасимптотические нижние границы информационной сложности статистических атак на симметричные криптосистемы
АН Алексейчук - Кибернетика и системный анализ, 2018 - dspace.nbuv.gov.ua
Предложен метод получения нижних границ информационной сложности
статистических атак на блочные или поточные шифры. Метод основан на применении …
статистических атак на блочные или поточные шифры. Метод основан на применении …
A new test statistic for key recovery attacks using multiple linear approximations
S Samajder, P Sarkar - International Conference on Cryptology in …, 2016 - Springer
The log-likelihood ratio (LLR) and the chi-squared distribution based test statistics have
been proposed in the literature for performing statistical analysis of key recovery attacks on …
been proposed in the literature for performing statistical analysis of key recovery attacks on …