Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

XSL attack

Known as: XSL (disambiguation) 
In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers. The attack was first published in… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
In this paper, we study GF-NLFSR, a Generalized Unbalanced Feistel Network (GUFN) which can be considered as an extension of the… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
2009
2009
The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2100, which is faster than exhaustive… Expand
  • table 1
  • table 2
2009
2009
In this paper, we study GF-NLFSR, a Generalized Unbalanced Feistel Network (GUFN) which can be considered as an extension of the… Expand
2008
2008
  • Buyun Qu, L. Liu
  • The 9th International Conference for Young…
  • 2008
  • Corpus ID: 1888863
Since the proposal of the XSL cryptanalysis and the construction of the big encryption system (BES), the potential for algebraic… Expand
  • table 2
  • table 1
2008
2008
Serpent is a block cipher which was suggested as a candidate for the advanced encryption standard (AES). Several recently… Expand
2008
2008
Serpent is a block cipher which was suggested as a candidate for the advanced encryption standard (AES). Several recently… Expand
2007
2007
Currently, the only plausible attack on the Advanced Encryption System (AES) is the XSL attack over F256 through the Big… Expand
  • table 1
  • figure 1
  • table 2
2004
2004
  • N. Courtois
  • Public Key Cryptography
  • 2004
  • Corpus ID: 18657278
The problem MQ of solving a system of multivariate quadratic equations over a finite field is relevant to the security of AES and… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
2004
2004
  • H. Raddum
  • AES Conference
  • 2004
  • Corpus ID: 31043217
It is well known that replacing the irreducible polynomial used in the AES one can produce 240 dual ciphers. In this paper we… Expand
Highly Cited
2002
Highly Cited
2002
Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by… Expand