Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
暂无分享,去创建一个
[1] Guido Bertoni,et al. Farfalle: parallel permutation-based cryptography , 2017, IACR Trans. Symmetric Cryptol..
[2] Willi Meier,et al. Optimized Interpolation Attacks on LowMC , 2015, ASIACRYPT.
[3] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[4] Joan Daemen,et al. The design of Xoodoo and Xoofff , 2018, IACR Trans. Symmetric Cryptol..
[5] Gregory V. Bard,et al. Algorithms for Solving Linear and Polynomial Systems of Equations over Finite Fields with Applications to Cryptanalysis , 2007 .
[6] Antoine Joux,et al. Algorithmic Cryptanalysis , 2009 .
[7] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[8] Lars R. Knudsen,et al. The Interpolation Attack on Block Ciphers , 1997, FSE.
[9] Jérémy Jean,et al. Key-Recovery Attacks on Full Kravatte , 2018, IACR Trans. Symmetric Cryptol..
[10] Guido Bertoni,et al. Keccak sponge function family main document , 2009 .