A method for security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite extensions of the field of two elements
Saved in:
| Date: | 2020 |
|---|---|
| Main Authors: | A. N. Aleksejchuk, S. N. Konjushok, M. V. Poremskij |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001074962 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019)
by: A. M. Oleksiichuk, et al.
Published: (2019)
Effectiveness of probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Upper bounds for imbalance of discrete functions realized by sequences of finite-state machines
by: A. N. Aleksejchuk, et al.
Published: (2019)
by: A. N. Aleksejchuk, et al.
Published: (2019)
Secure and practical randomized stream ciphers based on Reed–Solomon codes
by: A. N. Aleksejchuk, et al.
Published: (2017)
by: A. N. Aleksejchuk, et al.
Published: (2017)
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)
by: A. N. Aleksejchuk
Published: (2018)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Commutative ring extensions defined by perfect-like conditions
by: Alaoui Ismaili, et al.
Published: (2023)
by: Alaoui Ismaili, et al.
Published: (2023)
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)
by: A. A. Shyian, et al.
Published: (2021)
Scattering indicatrix of snow crystals
by: A. B. Veselovskaja, et al.
Published: (2016)
by: A. B. Veselovskaja, et al.
Published: (2016)
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021)
by: L. Kovalchuk, et al.
Published: (2021)
Skew PBW extensions over symmetric rings
by: Reyes, A., et al.
Published: (2021)
by: Reyes, A., et al.
Published: (2021)
A study of modules over rings and their extensions
by: S. A. Al-Hashmi, et al.
Published: (2018)
by: S. A. Al-Hashmi, et al.
Published: (2018)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Convex extensions for the quadratic problems over permutation matrices
by: O. S. Pichugina, et al.
Published: (2016)
by: O. S. Pichugina, et al.
Published: (2016)
Snow White passion, or, The phenomenon of intermedial circulation
by: O. Dubinina
Published: (2013)
by: O. Dubinina
Published: (2013)
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: V. A. Ustimenko
Published: (2014)
by: V. A. Ustimenko
Published: (2014)
On the problem of determining the genre of Gregor von Rezzori's "The Snows of Yesteryear" (Flowers in the Snow)
by: T. A. Basniak
Published: (2013)
by: T. A. Basniak
Published: (2013)
Practical Estimates of Block Cipher New Standards Modifications Resistance to Integer Differencial Cryptanalisys
by: L. V. Kovalchuk, et al.
Published: (2017)
by: L. V. Kovalchuk, et al.
Published: (2017)
Finite fields in coincidence of basic field characteristic and extension degree
by: R. B. Popovych
Published: (2014)
by: R. B. Popovych
Published: (2014)
Some primitive elements for the Artin--Schreier extensions of finite fields
by: R. B. Popovych
Published: (2015)
by: R. B. Popovych
Published: (2015)
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: Ustimenko, Vasyl O., et al.
Published: (2023)
by: Ustimenko, Vasyl O., et al.
Published: (2023)
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: V. Ustimenko, et al.
Published: (2023)
by: V. Ustimenko, et al.
Published: (2023)
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Extension of violence and bulling against smokers: the role of electronic means of communication
by: R. S. Kvasha
Published: (2019)
by: R. S. Kvasha
Published: (2019)
Automata over finite T-quasigroups
by: V. V. Skobelev, et al.
Published: (2018)
by: V. V. Skobelev, et al.
Published: (2018)
A String over the Gold of Snow, or Borderline State of Personality in Meditation Novel "Pilgrim" by Ihor Pavliuk
by: A. Tsaruk
Published: (2017)
by: A. Tsaruk
Published: (2017)
Automata over abstract finite quasigroups
by: V. V. Skobelev, et al.
Published: (2017)
by: V. V. Skobelev, et al.
Published: (2017)
Normal high order elements in finite field extensions based on the cyclotomic polynomials
by: Popovych, R., et al.
Published: (2020)
by: Popovych, R., et al.
Published: (2020)
Applisation of the phase correlation algorithm and its extension in the optical stabilizer of unmanned aerial vehicles
by: O. L. Dreval, et al.
Published: (2017)
by: O. L. Dreval, et al.
Published: (2017)
Influence of shelterbelts on snow cover surface distribution at Southern railways of Ukraine
by: I. R. Chorniavska
Published: (2017)
by: I. R. Chorniavska
Published: (2017)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
A lightweight Symmetric Block Cipher "Cypress" – Description and the Main Properties
by: Yu. Rodinko
Published: (2017)
by: Yu. Rodinko
Published: (2017)
Discrete Integrable Equations over Finite Fields
by: Kanki, M., et al.
Published: (2012)
by: Kanki, M., et al.
Published: (2012)
Spheres over finite rings and their polynomial maps
by: M. Golasinski, et al.
Published: (2013)
by: M. Golasinski, et al.
Published: (2013)
Analysis of the Opportunity of Control over the Trajectory of the Plane on the Correlation Function
by: Ju. V. Grishchenko, et al.
Published: (2015)
by: Ju. V. Grishchenko, et al.
Published: (2015)
Cross-like surface waves between finite cylindrical shells
by: T. S. Krasnopolskaja, et al.
Published: (2015)
by: T. S. Krasnopolskaja, et al.
Published: (2015)
Particle subensembles in random field with finite correlation time
by: Cherniak, O.M., et al.
Published: (2019)
by: Cherniak, O.M., et al.
Published: (2019)
The Eternal Snow Beauty / Translation from the Chinese, Introductory Article and Commentaries by T. Vechorynska
by: S. Bai, et al.
Published: (2021)
by: S. Bai, et al.
Published: (2021)
Similar Items
-
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019) -
Effectiveness of probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers
by: A. N. Aleksejchuk, et al.
Published: (2016) -
Upper bounds for imbalance of discrete functions realized by sequences of finite-state machines
by: A. N. Aleksejchuk, et al.
Published: (2019) -
Secure and practical randomized stream ciphers based on Reed–Solomon codes
by: A. N. Aleksejchuk, et al.
Published: (2017) -
Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
by: A. N. Aleksejchuk
Published: (2018)