Skip to search formSkip to main content

Interpolation attack

In cryptography, an interpolation attack is a type of cryptanalytic attack against block ciphers. After the two attacks, differential cryptanalysis… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
LowMC is a collection of block cipher families introduced at Eurocrypt 2015 by Albrecht et al. Its design is optimized for… Expand
  • table 1
  • table 2
Is this relevant?
2013
2013
By chosing all the 232 plaintexts of the four bytes in the first round, it can generate 224 Λ1 sets. Each Λ1 set will make all… Expand
  • table I
  • figure 1
Is this relevant?
2011
2011
Interpolation attack, as a kind of tampering manipulation, is a common issue in digital audio forgeries. A new blind forensic… Expand
  • figure 2
  • table 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
In the key recovery variant of the interpolation attack, exhaustive search is required to find the last round key K m . Therefore… Expand
  • figure 1
Is this relevant?
2001
2001
Abstract. In this paper an attack on block ciphers is introduced, the interpolation attack. This method is useful for attacking… Expand
  • table 1
  • table 2
Is this relevant?
2000
2000
In this paper, we first show that there are several equivalent keys for t + 1 chosen plaintexts if the degree of the reduced… Expand
  • figure 1
Is this relevant?
2000
2000
Interpolation attack was presented by Jakobsen and Knudsen at FSE’97. Interpolation attack is effective against ciphers that have… Expand
  • figure 1
  • table 1
Is this relevant?
2000
2000
We introduce an efficient interpolation attack which gives the tighter upper bound of the complexity and the number of pairs of… Expand
  • figure 1
  • table 2
  • table 4
  • table 3
  • table 5
Is this relevant?
1999
1999
This paper presents an efficient interpolation attack using a computer algebra system. The interpolation attack proposed by… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 5
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In this paper we introduce a new method of attacks on block ciphers, the interpolation attack. This new method is useful for… Expand
Is this relevant?