Semantic Scholar uses AI to extract papers important to this topic.
One of the major open problems in symmetric cryptanalysis is to discover new specif i c types of invariant properties which can… Expand On October 2-nd 2012 NIST announced its selection of the Keccak scheme as the new SHA-3 hash standard. In this paper we present… Expand The majority of the published attacks on reduced-round variants of block ciphers seeks to maximize the number of rounds to be… Expand In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against… Expand Matsui's linear cryptanalysis for iterated block ciphers is generalized to an attack called . This attack exploits a weakness… Expand The paper presents a general setting which is used to describe generalized linear and partitioning cryptanalysis. A measure of… Expand Matsui's linear cryptanalysis for iterated block ciphers is first general¬ ized by replacing his linear expressions with I/O sums… Expand In this work we give some bounds which can be used to determine if a block cipher is secure against generalized linear… Expand