Skip to search formSkip to main contentSkip to account menu

Interpolation attack

In cryptography, an interpolation attack is a type of cryptanalytic attack against block ciphers. After the two attacks, differential cryptanalysis… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
By chosing all the 232 plaintexts of the four bytes in the first round, it can generate 224 Λ1 sets. Each Λ1 set will make all… 
2011
2011
Interpolation attack, as a kind of tampering manipulation, is a common issue in digital audio forgeries. A new blind forensic… 
2004
2004
In the key recovery variant of the interpolation attack, exhaustive search is required to find the last round key Km. Therefore… 
2002
2002
  • 2002
  • Corpus ID: 7725164
2 Security 3 2.1 Security against differential and linear cryptanalysis . . . . . . . . . . . . . . . . . . . . . 3 2.1.1… 
2001
2001
Cryptographic Boolean functions should have large distance to functions with simple algebraic description to avoid cryptanalytic… 
2000
2000
Interpolation attack was presented by Jakobsen and Knudsen at FSE’97. Interpolation attack is effective against ciphers that have… 
2000
2000
We introduce an efficient interpolation attack which gives the tighter upper bound of the complexity and the number of pairs of… 
2000
2000
  • 2000
  • Corpus ID: 18309289
2 Security 2 2.1 Security against differential and linear cryptanalysis . . . . . . . . . . . . . . . . . . . . . 2 2.1.1… 
1999
1999
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have…