J Nakahara, P Sepehrdad, B Zhang… - Cryptology and Network …, 2009 - Springer
… Further we can extend the linear attack to 26-round with … computed linearhulls in practice for the original PRESENT cipher… ) of conventional linear relations based on a single linear trail. …
LR Knudsen - State of the Art in Applied Cryptography: Course on …, 1999 - Springer
… We focus on the main application of blockciphers, namely … blockciphers are linear cryptanalysis and differential cryptanalysis. Linear cryptanalysis makes use of so-called linearhulls ie…
A Röck, K Nyberg - Designs, codes and cryptography, 2013 - Springer
… linear approximations of an iterated blockcipher in the presence of several strong linear … While the effect of such trails in Matsui’s Algorithm 2, also called the linearhull effect, has been …
… of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable blockciphers. We examine in a step by step manner the linearhull theorem in a …
КЕ Лисицкий - Technology Audit and Production Reserves, 2014 - neliti.com
… New method for upper bounding the maximum average linearhull probability for SPNs [Text… Improving the upper bound on the maximum average linearhull probability for Rijndael [Text…
T Ashur - Cryptology ePrint Archive, 2015 - eprint.iacr.org
… In the sequel we will show how concatenating short linearhulls forms a sort of linear trail which we call a linear super-trail. We will first show how this can be used to improve the bias …
G Leander - Annual International Conference on the Theory and …, 2011 - Springer
… attacks based on a single linear trail. We present methods on how one can, in many … the blockcipher PUFFIN (see Section 4). We present an attack on full round PUFFIN, a blockcipher …
S Bulygin - Cryptology ePrint Archive, 2013 - eprint.iacr.org
… we investigate the linearhull effect in the light-weight blockcipher EPCBC. We give an efficient method of computing linearhulls with high capacity. We then apply found hulls to derive …
… Blockciphers are among the most important primitives in constructing … linearhulls is based on the miss-in-the-middle technique, ie, we start from the beginning and the end of the cipher, …