Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems
Saved in:
| Date: | 2018 |
|---|---|
| Main Author: | A. N. Aleksejchuk |
| Format: | Article |
| Language: | English |
| Published: |
2018
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000805860 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Achievable upper bound for the sup-norm of the elements' product in the ring of truncated polynomials and its application to the analysis of ntru-like cryptosystems
by: A. N. Aleksejchuk, et al.
Published: (2021)
by: A. N. Aleksejchuk, et al.
Published: (2021)
Amount of key information contained in open and encrypted text sets of the symmetric randomized mceliece cryptosystem
by: S. V. Mitin
Published: (2020)
by: S. V. Mitin
Published: (2020)
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017)
by: V. Ustimenko
Published: (2017)
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017)
by: H. Z. Khalimov
Published: (2017)
On new multivariate cryptosystems with nonlinearity gap
by: Ustimenko, V.
Published: (2017)
by: Ustimenko, V.
Published: (2017)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A.A.
Published: (2005)
by: Ustimenko, A.A.
Published: (2005)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
Lower bounds for the volume of the image of a ball
by: B. A. Klishchuk, et al.
Published: (2019)
by: B. A. Klishchuk, et al.
Published: (2019)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Lower bounds for the volume of the image of a ball
by: Klishchuk, B. A., et al.
Published: (2019)
by: Klishchuk, B. A., et al.
Published: (2019)
Uniform Lower Bound for Intersection Numbers of -Classes
by: Delecroix, Vincent, et al.
Published: (2020)
by: Delecroix, Vincent, et al.
Published: (2020)
Lower bounds for the volume of the image of a ball
by: Klishchuk, Bogdan, et al.
Published: (2023)
by: Klishchuk, Bogdan, et al.
Published: (2023)
On new multivariate cryptosystems based on hidden Eulerian equations
by: V. A. Ustimenko
Published: (2017)
by: V. A. Ustimenko
Published: (2017)
On new multivariate cryptosystems based on hidden Eulerian equations
by: Ustimenko, V.A.
Published: (2017)
by: Ustimenko, V.A.
Published: (2017)
Asymptotic theory of $U$-statistics
by: Korolyuk , V. S., et al.
Published: (1988)
by: Korolyuk , V. S., et al.
Published: (1988)
A method for security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite extensions of the field of two elements
by: A. N. Aleksejchuk, et al.
Published: (2020)
by: A. N. Aleksejchuk, et al.
Published: (2020)
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021)
by: L. Kovalchuk, et al.
Published: (2021)
Security of Poseidon hash function against non-binary differential and linear attacks
by: Kovalchuk, L., et al.
Published: (2021)
by: Kovalchuk, L., et al.
Published: (2021)
On lower bounds for the approximation of functions by local splines with nonfixed nodes
by: Shumeiko, A. A., et al.
Published: (2000)
by: Shumeiko, A. A., et al.
Published: (2000)
Inscribed Radius Bounds for Lower Ricci Bounded Metric Measure Spaces with Mean Convex Boundary
by: Burtscher, Annegret, et al.
Published: (2020)
by: Burtscher, Annegret, et al.
Published: (2020)
Lower bound in the Bernstein inequality for the first derivative of algebraic polynomials
by: Podvysotskaya, A. I., et al.
Published: (2009)
by: Podvysotskaya, A. I., et al.
Published: (2009)
Effectiveness of probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
The lower bound for the volume of a three-dimensional convex polytope
by: Kawaguchi, Ryo
Published: (2016)
by: Kawaguchi, Ryo
Published: (2016)
Lower bounds for Kolmogorov widths in classes of convolutions with Neumann kernel
by: V. V. Bodenchuk
Published: (2014)
by: V. V. Bodenchuk
Published: (2014)
The lower bound for the volume of a three-dimensional convex polytope
by: R. Kawaguchi
Published: (2015)
by: R. Kawaguchi
Published: (2015)
The lower bound for the volume of a three-dimensional convex polytope
by: Kawaguchi, R.
Published: (2015)
by: Kawaguchi, R.
Published: (2015)
Asymptotic Analysis of the Ponzano-Regge Model with Non-Commutative Metric Boundary Data
by: Oriti, D., et al.
Published: (2014)
by: Oriti, D., et al.
Published: (2014)
On lower bounds for the approximation of individual functions by local splines with nonfixed nodes
by: Ligun, A. A., et al.
Published: (1999)
by: Ligun, A. A., et al.
Published: (1999)
Asymptotic Behavior of Fractional Derivatives of Bounded Analytic Functions
by: I. Chyzhykov, et al.
Published: (2017)
by: I. Chyzhykov, et al.
Published: (2017)
Asymptotic Behavior of Fractional Derivatives of Bounded Analytic Functions
by: Chyzhykov, I., et al.
Published: (2017)
by: Chyzhykov, I., et al.
Published: (2017)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Fuzzy-regression models under conditions of the presence of non-numeric data in the statistical sample
by: Ju. A. Zak
Published: (2017)
by: Ju. A. Zak
Published: (2017)
On the Complex Symmetric and Skew-Symmetric Operators with a Simple Spectrum
by: Zagorodnyuk, S.M.
Published: (2011)
by: Zagorodnyuk, S.M.
Published: (2011)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
On the lower bound of the Gauss curvature of a strictly convex closed surface
by: V. I. Babenko
Published: (2015)
by: V. I. Babenko
Published: (2015)
On lower bounds for the widths of classes of functions defined by integral moduli of continuity
by: Derets, E. V., et al.
Published: (2000)
by: Derets, E. V., et al.
Published: (2000)
Similar Items
-
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020) -
Achievable upper bound for the sup-norm of the elements' product in the ring of truncated polynomials and its application to the analysis of ntru-like cryptosystems
by: A. N. Aleksejchuk, et al.
Published: (2021) -
Amount of key information contained in open and encrypted text sets of the symmetric randomized mceliece cryptosystem
by: S. V. Mitin
Published: (2020) -
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017) -
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017)