On the Distribution of Linear Biases: Three Instructive Examples, Advances in Cryptology -CRYPTO 2012. CRYPTO 2012, vol.7417, pp.50-67, 2012. ,
Applications of the Generalized Fourier Transform on Numerical Linear Algebra, Bit Numerical Mathematics, vol.45, pp.819-850, 2005. ,
On Linear Hulls and Trails, Progress in Cryptology -INDOCRYPT 2016. INDOCRYPT 2016, vol.10095, pp.269-286, 2016. ,
GIFT: A Small Present -Towards Reaching the Limit of Lightweight Encryption, Cryptographic Hardware and Embedded Systems -CHES 2017. CHES 2017, vol.10529, pp.321-345, 2017. ,
On Multiple Linear Approximations, Advances in Cryptology -CRYPTO 2004. CRYPTO, vol.3152, pp.1-22, 2004. ,
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks, IACR Cryptology ePrint Archive 2015, 935. International Association for Cryptologic Research, 2015. ,
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis, IACR Transactions on Symmetric Cryptology, vol.2016, pp.162-191, 2017. ,
PRESENT: An Ultra-Lightweight Block Cipher, Cryptographic Hardware and Embedded Systems -CHES 2007. CHES, vol.4727, pp.450-466, 2007. ,
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity, Fast Software Encryption. FSE 2012, vol.7549, pp.29-48, 2012. ,
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA, Selected Areas in Cryptography -SAC 2013. SAC 2013, vol.8282, pp.306-323, 2014. ,
Multivariate Profiling of Hulls for Linear Cryptanalysis, IACR Transactions on Symmetric Cryptology, issue.1, pp.101-125, 2018. ,
Vectorial Boolean Functions for Cryptography, Boolean Models and Methods in Mathematics, Computer Science, and Engineering (Encyclopedia of Mathematics and its Applications), pp.398-470, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-02060699
Linear Cryptanalysis of Reduced-Round PRESENT, Topics in Cryptology -CT-RSA 2010. CT-RSA 2010, vol.5985, pp.302-317, 2010. ,
An Algorithm for the Machine Calculation of, Complex Fourier Series. In: Mathematics of Computation, vol.19, pp.297-301, 1965. ,
Fast Correlation Attacks: An Algorithmic Point of View, Advances in Cryptology -EUROCRYPT 2002, vol.2332, pp.209-221, 2002. ,
Improving the Time Complexity of Matsui's Linear Cryptanalysis, Information Security and Cryptology -ICISC 2007. ICISC, vol.4817, pp.77-88, 2007. ,
A Statistical Saturation Attack against the Block Cipher PRESENT, Topics in Cryptology -CT-RSA 2009, vol.5473, pp.195-210, 2009. ,
The Design of Rijndael, 2002. ,
Probability distributions of correlation and differentials in block ciphers, Journal of Mathematical Cryptology, vol.1, pp.221-242, 2007. ,
, , 2019.
Multidimensional Linear Cryptanalysis of Reduced Round Serpent, Information Security and Privacy. ACISP, vol.5107, pp.203-215, 2008. ,
Multidimensional Extension of Matsui's Algorithm 2, Fast Software Encryption. FSE, vol.5665, pp.209-227, 2009. ,
Multidimensional Linear Cryptanalysis, Journal of Cryptology, vol.32, pp.1-34, 2019. ,
A novel generic Fast Fourier Transform pruning technique and complexity analysis, IEEE Transactions on Signal Processing, vol.53, issue.1, pp.274-282, 2004. ,
Decision Diagram Method for Calculation of Pruned Walsh Transform, IEEE Transactions on Computers, vol.50, issue.2, pp.147-157, 2001. ,
Linear Cryptanalysis Using Multiple Approximations, Advances in Cryptology -CRYPTO 1994. CRYPTO, vol.839, pp.26-39, 1994. ,
Quantum differential and linear cryptanalysis, IACR Transactions on Symmetric Cryptology 2016 (1), pp.71-94, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01652807
A New Method for Known Plaintext Attack of FEAL Cipher, Advances in Cryptology -EUROCRYPT 1992. EUROCRYPT 1992, vol.658, pp.81-91, 1993. ,
Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology -EUROCRYPT 1993. EUROCRYPT 1993, vol.765, pp.386-397, 1994. ,
The First Experimental Cryptanalysis of the Data Encryption Standard, Advances in Cryptology -CRYPTO 1994. CRYPTO, vol.839, pp.1-11, 1994. ,
On Correlation between the Order of S-boxes and the Strength of DES, Advances in Cryptology -EUROCRYPT 1994. EUROCRYPT, vol.950, pp.366-375, 1994. ,
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis, Information Security and Privacy. ACISP 2011, vol.6812, pp.61-74, 2011. ,
Linear Approximation of Block Ciphers, Advances in Cryptology -EUROCRYPT 1994. EUROCRYPT, vol.950, pp.439-444, 1994. ,
Statistical and Linear Independence of Binary Random Variables, IACR Cryptology ePrint Archive 2017, 432. International Association for Cryptologic Research, 2018. ,
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT, Cryptology and Network Security. CANS 2009, vol.5888, pp.58-75, 2009. ,
Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis, Selected Areas in Cryptography. SAC, vol.5867, pp.249-265, 2009. ,
On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN, Advances in Cryptology -EUROCRYPT 2011. EUROCRYPT 2011, vol.6632, pp.303-322, 2011. ,
On Probability of Success in Linear and Differential Cryptanalysis, Journal of Cryptology, vol.21, pp.131-147, 2008. ,
FFT-based Multidimensional Linear Attack on PRESENT using the 2-bit-Fixed Characteristic, Security and Communication Networks, vol.8, pp.3535-3545, 2015. ,