ElimLin algorithm revisited

NT Courtois, P Sepehrdad, P Sušil… - International Workshop on …, 2012 - Springer
… ], Raddum-Semaev algorithm [44] and ElimLin [16] are of interest. In this paper, we study the
elimination algorithm ElimLin that falls within the remit of Gröbner basis algorithms, though it …

Predicting outcomes of ElimLin attack on lightweight block cipher simon

N Courtois, G Song, I Papapanagiotakis-Bousy… - SECRYPT …, 2016 - discovery.ucl.ac.uk
… As already explained in Conjecture 2.1 page 2, we expect that there are at least 3 distinct
stages in ElimLin algorithm. With these notations until now we have been only looking at stage …

On selection of samples in algebraic attacks and a new technique to find hidden low degree equations

P Sušil, P Sepehrdad, S Vaudenay - Australasian Conference on …, 2014 - Springer
… Our results show that when ElimLin algorithm is applied to a set of n plaintexts from a cube,
the linear span it recovers is larger than for a set of n random samples. We also show that …

On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations

P Sušilα, P Sepehrdad, S Vaudenay - Information Security and Privacy - Springer
… Our results show that when ElimLin algorithm is applied to a set of n plaintexts from a cube,
the linear span it recovers is larger than for a set of n random samples. We also show that …

On selection of samples in algebraic attacks and a new technique to find hidden low degree equations

P Sušil, P Sepehrdad, S Vaudenay… - International Journal of …, 2016 - Springer
… Our results show that when ElimLin algorithm is applied to a set of n plaintexts from a cube,
the linear span it recovers is larger than for a set of n random samples. We also show that …

Combined algebraic and truncated differential cryptanalysis on reduced-round simon

N Courtois, T Mourouzis, G Song… - … on Security and …, 2014 - ieeexplore.ieee.org
… We run experiments using SAT solvers and ElimLin Algorithm on a machine with the following
characteristics, CPU: Intel i7-3520m 2.9GHz, RAM: 4G and OS: 64-bit Windows 8. In all of …

Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis

NT Courtois - Paradigms in Cryptology–Mycrypt 2016. Malicious and …, 2017 - Springer
… discover that (experimentally) ElimLin breaks up to 16 rounds … ElimLin algorithm similar to
those studied in [30] and shows that the number of equations which could be added to ElimLin

Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT

J Nakahara, P Sepehrdad, B Zhang… - Cryptology and Network …, 2009 - Springer
… The contributions of this paper include the first linear hull and a revisit of the algebraic … In
this paper we deploy ElimLin algorithm proposed by Courtois against DES [9] and F4 algorithm

Algebraic cryptanalysis of deterministic symmetric encryption

P Sušil - 2015 - infoscience.epfl.ch
… consider a fundamental algorithm of algebraic cryptanalysis called ElimLin. This algorithm
is used … In this chapter, we show that results of ElimLin algorithm are invariant with respect to …

Improved algebraic attacks on lightweight block ciphers

SL Yeo, DP Le, K Khoo - Journal of cryptographic Engineering, 2021 - Springer
… First, we present an ElimLin-SAT framework to carry out … Standard (DES) and subsequently
revisited in [20]. This simple … Essentially, the ElimLin algorithm successively eliminates …