Key moments
Organization
Organization
0:56
Organization
0:56
Linear Trails and Linear Hulls
Linear Trails and Linear Hulls
1:26
Linear Correlations
Linear Correlations
2:08
Linear Correlations
2:08
Algorithm 2 style attacks (multiple appr.)
Algorithm 2 style attacks (multiple appr.)
7:42
Multivariate Normal Distributions
Multivariate Normal Distributions
11:36
Algorithm 2MT
Algorithm 2MT
14:00
Algorithm 2MT
14:00
Application to DES
Application to DES
16:53
Application to DES
16:53
Multiple linear cryptanalysis BCQ04
Multiple linear cryptanalysis BCQ04
17:58
Multidimensional linear cryptanalysis HCN09
Multidimensional linear cryptanalysis HCN09
18:40
Recent linear attacks on DES
Recent linear attacks on DES
19:00
Merits of the attack
Merits of the attack
19:31
Merits of the attack
19:31
Generalization
Generalization
20:11
Generalization
20:11
Conclusion
Conclusion
20:49
Conclusion
20:49
Sync to video time
Description
N/ALikes
164Views
2020Nov 5
Key moments
View all
View all
Transcript
Follow along using the transcript.
Show transcript
IACR
9.87K subscribers
Transcript
NaN / NaN
15:45
Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property
IACR
79 views • 4 years ago