Linear Models for Keystream Generators
IEEE Transactions on Computers
Introduction to Algorithms
A New Version of the Stream Cipher SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Efficient Algorithms for Computing Differential Properties of Addition
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Distinguishing Attacks on SOBER-t16 and t32
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Scream: A Software-Efficient Stream Cipher
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
A New Class of Invertible Mappings
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Cryptanalysis of Stream Ciphers with Linear Masking
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Vectorial Approach to Fast Correlation Attacks
Designs, Codes and Cryptography
Cryptography: An Introduction
On the optimality of linear, differential, and sequential distinguishers
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
International Journal of Security and Networks
Linear Distinguishing Attack on Shannon
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
ISC '08 Proceedings of the 11th international conference on Information Security
A multidimensional linear distinguishing attack on the Shannon cipher
International Journal of Applied Cryptography
On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
On large distributions for linear cryptanalysis
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Linear approximations of addition modulo 2n-1
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Improved linear distinguishers for SNOW 2.0
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Hi-index | 0.00 |
Let X1,X2,..., Xk be independent n bit random variables. If they have arbitrary distributions, we show how to compute distributions like Pr{X1⊕X2⊕...⊕Xk} and Pr$\{X_1 \boxplus X_2 \boxplus ...\boxplus X_k\}$ in complexity O(kn 2n). Furthermore, if X1,X2,..., Xk are uniformly distributed we demonstrate a large class of functions F(X1,X2,..., Xk), for which we can compute their distributions efficiently. These results have applications in linear cryptanalysis of stream ciphers as well as block ciphers. A typical example is the approximation obtained when additions modulo 2n are replaced by bitwise addition. The efficiency of such an approach is given by the bias of a distribution of the above kind. As an example, we give a new improved distinguishing attack on the stream cipher SNOW 2.0.