Semantic Scholar uses AI to extract papers important to this topic.

2015

2015

- Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
- ASIACRYPT
- 2015

LowMC is a collection of block cipher families introduced at Eurocrypt 2015 by Albrecht et al. Its design is optimized for… Expand

Is this relevant?

2013

2013

- Jingmei Liu, Shaopeng Chen, Linsen Zhao
- 5th International Conference on Intelligent…
- 2013

By chosing all the 232 plaintexts of the four bytes in the first round, it can generate 224 Λ1 sets. Each Λ1 set will make all… Expand

Is this relevant?

2011

2011

- Qian Yi Shi, Xiaohong Ma
- 3rd International Conference on Awareness Science…
- 2011

Interpolation attack, as a kind of tampering manipulation, is a common issue in digital audio forgeries. A new blind forensic… Expand

Is this relevant?

2005

2005

- Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong
- IEICE Transactions
- 2005

In the key recovery variant of the interpolation attack, exhaustive search is required to find the last round key K m . Therefore… Expand

Is this relevant?

2001

2001

- Thomas Jakobsen, Lars R. Knudsen
- Journal of Cryptology
- 2001

Abstract. In this paper an attack on block ciphers is introduced, the interpolation attack. This method is useful for attacking… Expand

Is this relevant?

2000

2000

- Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong
- Selected Areas in Cryptography
- 2000

In this paper, we first show that there are several equivalent keys for t + 1 chosen plaintexts if the degree of the reduced… Expand

Is this relevant?

2000

2000

- Kazumaro Aoki
- 2000

Interpolation attack was presented by Jakobsen and Knudsen at FSE’97. Interpolation attack is effective against ciphers that have… Expand

Is this relevant?

2000

2000

We introduce an efficient interpolation attack which gives the tighter upper bound of the complexity and the number of pairs of… Expand

Is this relevant?

1999

1999

This paper presents an efficient interpolation attack using a computer algebra system. The interpolation attack proposed by… Expand

Is this relevant?

Highly Cited

1997

Highly Cited

1997

- Thomas Jakobsen, Lars R. Knudsen
- FSE
- 1997

In this paper we introduce a new method of attacks on block ciphers, the interpolation attack. This new method is useful for… Expand

Is this relevant?

By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy Policy, Terms of Service, and Dataset License

ACCEPT & CONTINUE