2020
DOI: 10.1007/s10559-020-00220-1
|View full text |Cite
|
Sign up to set email alerts
|

A Method of Evaluating the Security of Snow 2.0-Like Ciphers Against Correlation Attacks Over the Finite Extensions of Two Element Field

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…In [5], it is shown that the parameter (3) takes an important role in security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite fields of characteristic 2. Each of such ciphers is defined by a set of s-boxes, a linear feedback shift register (LFSR), and an invertible matrix D over a field of order t 2 .…”
Section: Preliminariesmentioning
confidence: 99%
See 4 more Smart Citations
“…In [5], it is shown that the parameter (3) takes an important role in security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite fields of characteristic 2. Each of such ciphers is defined by a set of s-boxes, a linear feedback shift register (LFSR), and an invertible matrix D over a field of order t 2 .…”
Section: Preliminariesmentioning
confidence: 99%
“…Each of such ciphers is defined by a set of s-boxes, a linear feedback shift register (LFSR), and an invertible matrix D over a field of order t 2 . In [5], it is shown that the time and the data complexities of a correlation attack from [6] against such type of ciphers can be evaluated using Algorithm 1 directly by the values (3) of the cipher's s-boxes and the branch number…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations