Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,832,437 papers from all fields of science
Search
Sign In
Create Free Account
XSL attack
Known as:
XSL (disambiguation)
In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers. The attack was first published in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Block cipher
Cipher
Ciphertext
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Security Analysis of HyRal
H. Youm
,
J. Song
,
Sun Young Lee
2011
Corpus ID: 2462738
It is further believed that any practical attacks against HyRal are not possible with respect to the state-of-the-art. That is…
Expand
2008
2008
An XSL Analysis on BES
Buyun Qu
,
Lianhao Liu
International Conference for Young Computer…
2008
Corpus ID: 1888863
Since the proposal of the XSL cryptanalysis and the construction of the big encryption system (BES), the potential for algebraic…
Expand
2008
2008
Cryptanalysis of Spent with Systems of Algebraic Equations
Zhihua Hu
,
Zhongping Qin
,
Haiqing Han
International Conference on Computer Science and…
2008
Corpus ID: 14671978
Serpent is a block cipher which was suggested as a candidate for the Advanced Encryption Standard (AES). Several recently…
Expand
2008
2008
Efficient Multiplication in Finite Fields of Characteristic 3 and 5 for Pairing Based Cryptography
Murat Cenk
,
F. Özbudak
2008
Corpus ID: 47619231
25•26•27 Aralýk December 2008 • Ankara / TÜRKİYE 31 Bildiriler Kitabý Proceedings Abstract—Algebraic attack on AES was proposed…
Expand
2004
2004
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2
N. Courtois
International Conference on Theory and Practice…
2004
Corpus ID: 18657278
The problem MQ of solving a system of multivariate quadratic equations over a finite field is relevant to the security of AES and…
Expand
2004
2004
More Dual Rijndaels
H. Raddum
AES Conference
2004
Corpus ID: 31043217
It is well known that replacing the irreducible polynomial used in the AES one can produce 240 dual ciphers. In this paper we…
Expand
2003
2003
Semigroup of Matrices over GF{2s} and its Relation to AES
O. Grošek
,
Julius Siska
Computers and artificial intelligence
2003
Corpus ID: 36734955
We introduce to readers a new matrix C for MixColumn operation for AES algorithm for discussion. This matrix has significantly…
Expand
2002
2002
Position paper for STORK
L. Knudsen
2002
Corpus ID: 59726747
Traditionally, cryptography has been understood as the art of providing secure communication over insecure channels. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE