Knudsen and Meier applied the χ^2-attack to RC6. This attack is one of the most effective attacks for RC6. The χ^2-attack can be used for both distinguishing attacks and for key recovery attacks. Up to the present, theoretical analysis of χ^2-attacks, especially the relation between a distinguishing attack and a key recovery attack, has not been discussed. In this paper, we investigate the theoretical relation between the distinguishing attack and the key recovery attack for the first time, and prove the theorem to evaluate the success probability of a key recovery attack by using the results of a distinguishing attack. We also demonstrate the accuracy to χ^2-attack on RC5-64 and RC6 without post-whitening by comparing the implemented resul...
A new key recovery attack under related-key model on RC4 is presented in this paper. This novel atta...
Various attacks against RC5 have been analyzed intensively. A known plaintext attack has not been re...
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We de...
The χ^2-attack was originally proposed by Knudsen and Meier. This attack is one of the most effectiv...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack can be used for both distinguishing ...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack recovers a key by using high correla...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack recovers a key by using high correla...
In this paper, we make progress on χ^2-attack by introducing the optimization. We propose three key...
We investigate the cryptanalysis of the reduced-round RC6 without whitening. Up to the present, prev...
We investigate the cryptanalysis of reduced-round RC6 without whitening. Up to now, key recovery alg...
In this paper we present an attack on a reduced round version of CRYPTON. The attack is based on the...
In this paper, we propose two new attacks against stream cipher RC4 which can recover the secret key...
Abstract. The first contribution of this paper is a new approach to χ2 analyses of block ciphers in ...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
A new key recovery attack under related-key model on RC4 is presented in this paper. This novel atta...
Various attacks against RC5 have been analyzed intensively. A known plaintext attack has not been re...
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We de...
The χ^2-attack was originally proposed by Knudsen and Meier. This attack is one of the most effectiv...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack can be used for both distinguishing ...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack recovers a key by using high correla...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack recovers a key by using high correla...
In this paper, we make progress on χ^2-attack by introducing the optimization. We propose three key...
We investigate the cryptanalysis of the reduced-round RC6 without whitening. Up to the present, prev...
We investigate the cryptanalysis of reduced-round RC6 without whitening. Up to now, key recovery alg...
In this paper we present an attack on a reduced round version of CRYPTON. The attack is based on the...
In this paper, we propose two new attacks against stream cipher RC4 which can recover the secret key...
Abstract. The first contribution of this paper is a new approach to χ2 analyses of block ciphers in ...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
A new key recovery attack under related-key model on RC4 is presented in this paper. This novel atta...
Various attacks against RC5 have been analyzed intensively. A known plaintext attack has not been re...
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We de...