Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block ciphers from the key input to the ciphertext (for a fixed plaintext block). This is a usual setting of a one-way function, used for instance in modes of operation such as KFB (key feedback). We instantiate the block cipher with the full 16-round DES and $s^2$-DES, 10-round LOKI91 and 24-round Khufu, for which linear relations with high bias are well known. Other interesting targets include the full 8.5-round IDEA and PES ciphers for which high bias linear relations exist under the assumption of weak keys. Consequences of these findings impact the security of modes of operation such as KFB and of pseudorandom number/bit generators. These ...
In this talk we consider linear approximations of layered cipher constructions with secret key-depen...
A blockcipher is said to have a linear factor if, for all plaintexts and keys, there is a fixed non-...
Weakness of a block cipher, which has provable immunity against linear cryptanalysis, is investigate...
Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block c...
The main goal of this diploma work is the implementation of Matsui's linear cryptanalysis of DES and...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose co...
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insig...
Despite the fact that we evidently have very good block ciphers at hand today, some fundamental ques...
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a num...
The contributions of this paper include the first linear hull and a revisit of the algebraic cryptan...
In this paper we introduce a new extension of linear cryptanalysis that may reduce the complexity of...
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a nu...
Pseudorandom generators based on linear feedback shift registers (LFSR) are a traditional building b...
In this talk we consider linear approximations of layered cipher constructions with secret key-depen...
In this talk we consider linear approximations of layered cipher constructions with secret key-depen...
A blockcipher is said to have a linear factor if, for all plaintexts and keys, there is a fixed non-...
Weakness of a block cipher, which has provable immunity against linear cryptanalysis, is investigate...
Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block c...
The main goal of this diploma work is the implementation of Matsui's linear cryptanalysis of DES and...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose co...
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insig...
Despite the fact that we evidently have very good block ciphers at hand today, some fundamental ques...
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a num...
The contributions of this paper include the first linear hull and a revisit of the algebraic cryptan...
In this paper we introduce a new extension of linear cryptanalysis that may reduce the complexity of...
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a nu...
Pseudorandom generators based on linear feedback shift registers (LFSR) are a traditional building b...
In this talk we consider linear approximations of layered cipher constructions with secret key-depen...
In this talk we consider linear approximations of layered cipher constructions with secret key-depen...
A blockcipher is said to have a linear factor if, for all plaintexts and keys, there is a fixed non-...
Weakness of a block cipher, which has provable immunity against linear cryptanalysis, is investigate...