Introduction First attack Clamping attacks Low-Data Attack Conclusion
Low-Memory Attacks against 2-Round Even-Mansour using the 3-XOR Problem
Gaëtan Leurent, Ferdinand Sibleyras
Inria, France
Crypto 2019
1 / 23
Low-Memory Attacks against 2-Round Even-Mansour using the 3-XOR - - PowerPoint PPT Presentation
Introduction First attack Clamping attacks Low-Data Attack Conclusion Low-Memory Attacks against 2-Round Even-Mansour using the 3-XOR Problem Gatan Leurent, Ferdinand Sibleyras Inria, France Crypto 2019 1 / 23 Introduction First attack
Introduction First attack Clamping attacks Low-Data Attack Conclusion
1 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
2 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
2 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
2 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
3 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
3 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
3 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
3 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
4 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
4 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
4 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
5 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
5 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
5 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
6 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
6 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
7 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
7 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
7 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
8 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
8 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
8 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
9 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
9 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
10 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
11 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
12 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
12 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
13 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
14 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
15 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
15 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
15 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
15 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
15 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
16 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
Introduction First attack Clamping attacks Low-Data Attack Conclusion
Introduction First attack Clamping attacks Low-Data Attack Conclusion
16 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
17 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
18 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
19 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
19 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
19 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
19 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
19 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
19 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
20 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
20 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
21 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
21 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
21 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
22 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
22 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
22 / 23
Introduction First attack Clamping attacks Low-Data Attack Conclusion
23 / 23
s
1 / 1
s
1 / 1