2016
DOI: 10.1007/978-3-319-30840-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…This research might be useful for the improvement of various methods of information security, as well as other practical use [45][46][47][48][49][50][51][52]. In particular, the obtained results can be used to build non-linear replacement nodes for modern block symmetric ciphers, including the formation of sblocks of the Ukrainian national block encryption standard Kalyna (DSTU 7624: 2014) [3,53], the cryptographic hashing algorithm Kupyna [54][55][56], as well as the recently approved stream encryption standard Strumok [16].…”
Section: Prospects For Further Researchmentioning
confidence: 99%
“…This research might be useful for the improvement of various methods of information security, as well as other practical use [45][46][47][48][49][50][51][52]. In particular, the obtained results can be used to build non-linear replacement nodes for modern block symmetric ciphers, including the formation of sblocks of the Ukrainian national block encryption standard Kalyna (DSTU 7624: 2014) [3,53], the cryptographic hashing algorithm Kupyna [54][55][56], as well as the recently approved stream encryption standard Strumok [16].…”
Section: Prospects For Further Researchmentioning
confidence: 99%
“…The combined probability for these linear approximations is calculated using the pilingup lemma introduced by Matsui in [2].…”
Section: Linear Probability Estimationsmentioning
confidence: 99%
“…There are various extensions to classical linear cryptanalysis that aims as well to reduce the complexity or improve the attack by recovering more key bits. One example is using multiple linear approximations to obtain more information about the key bits [11], [9], [2], [10], [4].…”
Section: Key Recovery In Complexity Datamentioning
confidence: 99%
See 2 more Smart Citations