Login / Signup
Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective - Applications to Ascon, Grain v1, Xoodoo, and ChaCha.
Kai Hu
Thomas Peyrin
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
higher order
low order
pairwise
viewpoint
markov random field
high order
countermeasures
natural images
malicious attacks
chosen plaintext
data sets
lambda calculus
malicious users
lower order
markov models
linear model
digital images
multiresolution
bayesian networks