A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
This paper identifies several larger classes of weak keys. We show how to distinguish classes of keys and give a 28-round linear attack applicable to half the keys. ... We also observe how some specific properties of PRINTcipher allow us to collect several samples from each plaintext-ciphertext pair. ... With this work, linear cryptanalysis has reached 28 rounds of PRINTcipher. ...doi:10.1007/978-3-642-25578-6_10 fatcat:eokqsr3gcbeq3dq5itdkq7gpua
This thesis studies cryptanalysis of symmetric algorithms including block ciphers and hash functions. ... We employ differential probability distributions to improve the truncated differential cryptanalysis and apply key-recovery attacks to the reduced variants of LBlock. ... ACKNOWLEDGEMENTS x List of Publications ...doi:10.25949/19436372.v1 fatcat:sxez4wtoebfm3jfqitpapci7e4