Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Interpolation attack

In cryptography, an interpolation attack is a type of cryptanalytic attack against block ciphers. After the two attacks, differential cryptanalysis… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
LowMC is a collection of block cipher families introduced at Eurocrypt 2015 by Albrecht et al. Its design is optimized for… Expand
  • table 1
  • table 2
2013
2013
By chosing all the 232 plaintexts of the four bytes in the first round, it can generate 224 Λ1 sets. Each Λ1 set will make all… Expand
  • table I
  • figure 1
2011
2011
  • Q. Shi, Xiaohong Ma
  • 3rd International Conference on Awareness Science…
  • 2011
  • Corpus ID: 27658502
Interpolation attack, as a kind of tampering manipulation, is a common issue in digital audio forgeries. A new blind forensic… Expand
  • figure 2
  • table 1
  • figure 3
  • figure 4
  • figure 5
2001
2001
Abstract. In this paper an attack on block ciphers is introduced, the interpolation attack. This method is useful for attacking… Expand
  • table 1
  • table 2
2000
2000
In this paper, we first show that there are several equivalent keys for t + 1 chosen plaintexts if the degree of the reduced… Expand
  • figure 1
2000
2000
We introduce an efficient interpolation attack which gives the tighter upper bound of the complexity and the number of pairs of… Expand
  • figure 1
  • table 2
  • table 4
  • table 3
  • table 5
2000
2000
Interpolation attack was presented by Jakobsen and Knudsen at FSE’97. Interpolation attack is effective against ciphers that have… Expand
  • figure 1
  • table 1
1999
1999
This paper presents an efficient interpolation attack using a computer algebra system. The interpolation attack proposed by… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 5
Highly Cited
1997
Highly Cited
1997
In this paper we introduce a new method of attacks on block ciphers, the interpolation attack. This new method is useful for… Expand
Review
1997
Review
1997
  • L. Knudsen
  • State of the Art in Applied Cryptography
  • 1997
  • Corpus ID: 3720387
In this paper we give a short overview of the state of the art of secret key block ciphers. We focus on the main application of… Expand
  • figure 1
  • table 1