An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis
In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers. Since these linear cryptanalytic techniques require exploitable linear approximations to relate the inp...
Saved in:
| Published in: | Quantum reports Vol. 6; no. 4; pp. 714 - 734 |
|---|---|
| Main Authors: | , , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Basel
MDPI AG
01.12.2024
|
| Subjects: | |
| ISSN: | 2624-960X, 2624-960X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers. Since these linear cryptanalytic techniques require exploitable linear approximations to relate the input and output of vectorial Boolean functions, e.g., the plaintext, ciphertext, and key of the cryptographic function, finding these approximations is essential. For this purpose, the Correlation Extraction Algorithm (CEA), which leverages the emerging field of quantum computing, appears promising. However, there has been no comprehensive analysis of the CEA regarding finding an exploitable linear approximation for linear cryptanalysis. In this paper, we conduct a thorough theoretical analysis of the CEA. We aim to investigate its potential in finding a linear approximation with prescribed statistical characteristics. To support our theoretical work, we also present the results of a small empirical study based on a computer simulation. The analysis in this paper shows that an approach that uses the CEA to find exploitable linear approximations has an asymptotic advantage, reducing a linear factor to a logarithmic one in terms of time complexity, and an exponential advantage in terms of space complexity compared to a classical approach that uses the fast Walsh transform. Furthermore, we show that in specific scenarios, CEA can exponentially reduce the search space for exploitable linear approximations in terms of the number of input bits of the cipher. Neglecting the unresolved issue of efficiently checking the property of linear approximations measured by the CEA, our results indicate that the CEA can support the linear cryptanalysis of vectorial Boolean functions with relatively few (e.g., n≤32) output bits. |
|---|---|
| AbstractList | In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers. Since these linear cryptanalytic techniques require exploitable linear approximations to relate the input and output of vectorial Boolean functions, e.g., the plaintext, ciphertext, and key of the cryptographic function, finding these approximations is essential. For this purpose, the Correlation Extraction Algorithm (CEA), which leverages the emerging field of quantum computing, appears promising. However, there has been no comprehensive analysis of the CEA regarding finding an exploitable linear approximation for linear cryptanalysis. In this paper, we conduct a thorough theoretical analysis of the CEA. We aim to investigate its potential in finding a linear approximation with prescribed statistical characteristics. To support our theoretical work, we also present the results of a small empirical study based on a computer simulation. The analysis in this paper shows that an approach that uses the CEA to find exploitable linear approximations has an asymptotic advantage, reducing a linear factor to a logarithmic one in terms of time complexity, and an exponential advantage in terms of space complexity compared to a classical approach that uses the fast Walsh transform. Furthermore, we show that in specific scenarios, CEA can exponentially reduce the search space for exploitable linear approximations in terms of the number of input bits of the cipher. Neglecting the unresolved issue of efficiently checking the property of linear approximations measured by the CEA, our results indicate that the CEA can support the linear cryptanalysis of vectorial Boolean functions with relatively few (e.g., n≤32) output bits. |
| Author | Pickel, Valentin Eble, Holger Graebnitz, Christoph Morgner, Frank Margraf, Marian Hattenbach, Hannes |
| Author_xml | – sequence: 1 givenname: Christoph surname: Graebnitz fullname: Graebnitz, Christoph – sequence: 2 givenname: Valentin surname: Pickel fullname: Pickel, Valentin – sequence: 3 givenname: Holger surname: Eble fullname: Eble, Holger – sequence: 4 givenname: Frank surname: Morgner fullname: Morgner, Frank – sequence: 5 givenname: Hannes orcidid: 0000-0001-6783-8180 surname: Hattenbach fullname: Hattenbach, Hannes – sequence: 6 givenname: Marian orcidid: 0009-0005-8577-1318 surname: Margraf fullname: Margraf, Marian |
| BookMark | eNpVkUtLAzEUhYMoWGu3rgdct95kMo8sS6laKLhRcBfybKdMkzbJQPvvnT4QXZ3D5bvncjkP6NZ5ZxB6wjDJcwYv-0641G1LoAA0v0EDUhI6ZiV83_7x92gU4wYASA2ElfUAqanL5odknDY6mzrRHmMTM2-ztDbZzIdgWpEaf4aCUGc7bVc-NGm9zRp35Vwyh3RaWzbOiJDNwnGXxDXuEd1Z0UYzuuoQfb3OP2fv4-XH22I2XY5VXlZprLSpMGGF1LhSTEKd90IFhtJaRgtcaAy6UJKowkjGoCSaSAtWKVppg0k-RItLrvZiw3eh2Ypw5F40_DzwYcVFSI1qDadYgq0pxZoxWlkirCEEgyRS1sTWZZ_1fMnaBb_vTEx847vQPxR5jimrCGEUempyoVTwMQZjf69i4Kde-P9e8h96OIQy |
| Cites_doi | 10.1007/s11128-023-03921-6 10.1007/s11424-020-0028-6 10.1007/s10623-023-01280-y 10.1007/978-3-319-29360-8 10.1090/gsm/047 10.1209/0295-5075/132/40001 10.1109/ICCES54183.2022.9835864 10.3390/sym16091124 10.1007/s11128-019-2299-1 10.22331/q-2023-07-26-1069 10.1002/spe.3039 10.1038/s41592-019-0686-2 10.1007/3-540-48658-5 10.1007/978-3-642-03317-9 10.1007/s10773-021-04779-z 10.1007/978-3-030-89432-0 10.1007/s11128-015-0983-3 10.1016/j.automatica.2004.04.016 10.1109/TC.1977.1674921 10.1007/3-540-47555-9 10.1007/s10623-012-9697-z 10.1093/biomet/26.4.404 10.46586/tosc.v2016.i1.71-94 10.1007/s12043-023-02529-w 10.1007/3-540-48285-7 10.1119/1.1891170 |
| ContentType | Journal Article |
| Copyright | 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO HCIFZ P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS DOA |
| DOI | 10.3390/quantum6040043 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One ProQuest Central Korea SciTech Premium Collection Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database Advanced Technologies & Aerospace Collection Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2624-960X |
| EndPage | 734 |
| ExternalDocumentID | oai_doaj_org_article_41b0f8441d9947f2afe2210b2bb82f86 10_3390_quantum6040043 |
| GroupedDBID | AADQD AAFWJ AAYXX AFFHD AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS BENPR BGLVJ CCPQU CITATION GROUPED_DOAJ HCIFZ IAO IGS ITC MODMG M~E OK1 PHGZM PHGZT PIMPY PQGLB 8FE 8FG ABUWG AZQEC DWQXO P62 PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c367t-cde71295bd17c9b0837c94a106ff94515d10d5cb2c5eb99062d2bf0fcc47de123 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001383884800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2624-960X |
| IngestDate | Fri Oct 03 12:26:46 EDT 2025 Sun Jul 13 04:00:33 EDT 2025 Sat Nov 29 07:13:04 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c367t-cde71295bd17c9b0837c94a106ff94515d10d5cb2c5eb99062d2bf0fcc47de123 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0009-0005-8577-1318 0000-0001-6783-8180 |
| OpenAccessLink | https://doaj.org/article/41b0f8441d9947f2afe2210b2bb82f86 |
| PQID | 3149722940 |
| PQPubID | 5046865 |
| PageCount | 21 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_41b0f8441d9947f2afe2210b2bb82f86 proquest_journals_3149722940 crossref_primary_10_3390_quantum6040043 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-12-01 |
| PublicationDateYYYYMMDD | 2024-12-01 |
| PublicationDate_xml | – month: 12 year: 2024 text: 2024-12-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Quantum reports |
| PublicationYear | 2024 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | Bogdanov (ref_23) 2014; 70 Virtanen (ref_33) 2020; 17 Ding (ref_10) 2023; 7 ref_32 ref_31 Chen (ref_9) 2022; 35 ref_19 ref_17 ref_15 Li (ref_26) 2021; 60 Clopper (ref_30) 1934; 26 Kaplan (ref_11) 2016; 2016 Malviya (ref_16) 2020; 132 Zhou (ref_12) 2015; 14 ref_22 Brown (ref_24) 1977; C-26 ref_21 ref_20 Gill (ref_1) 2022; 52 Chen (ref_34) 2004; 40 Gerjuoy (ref_3) 2005; 73 Zou (ref_14) 2023; 22 ref_2 ref_29 ref_28 Proos (ref_4) 2003; 3 ref_27 Burek (ref_8) 2022; 10 Malviya (ref_18) 2023; 97 David (ref_13) 2024; 92 ref_5 ref_7 Cui (ref_25) 2019; 18 ref_6 |
| References_xml | – volume: 3 start-page: 317 year: 2003 ident: ref_4 article-title: Shor’s Discrete Logarithm Quantum Algorithm for Elliptic Curves publication-title: Quantum Inf. Comput. – volume: 22 start-page: 171 year: 2023 ident: ref_14 article-title: New Results on Quantum Boomerang Attacks publication-title: Quantum Inf. Process. doi: 10.1007/s11128-023-03921-6 – volume: 35 start-page: 373 year: 2022 ident: ref_9 article-title: Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems publication-title: J. Syst. Sci. Complex. doi: 10.1007/s11424-020-0028-6 – ident: ref_32 – volume: 10 start-page: 678 year: 2022 ident: ref_8 article-title: Algebraic Attacks on Block Ciphers Using Quantum Annealing publication-title: IEEE Trans. Emerg. Top. Comput. – volume: 92 start-page: 723 year: 2024 ident: ref_13 article-title: Quantum Impossible Differential Attacks: Applications to AES and SKINNY publication-title: Des. Codes Cryptogr. doi: 10.1007/s10623-023-01280-y – ident: ref_6 doi: 10.1007/978-3-319-29360-8 – ident: ref_28 doi: 10.1090/gsm/047 – volume: 132 start-page: 40001 year: 2020 ident: ref_16 article-title: Linear approximation of a vectorial Boolean function using quantum computing publication-title: EPL (Europhys. Lett.) doi: 10.1209/0295-5075/132/40001 – ident: ref_7 doi: 10.1109/ICCES54183.2022.9835864 – ident: ref_15 doi: 10.3390/sym16091124 – volume: 18 start-page: 182 year: 2019 ident: ref_25 article-title: Quantum cryptographic property testing of multi-output Boolean functions publication-title: Quantum Inf. Process. doi: 10.1007/s11128-019-2299-1 – volume: 7 start-page: 1069 year: 2023 ident: ref_10 article-title: Limitations of the Macaulay Matrix Approach for Using the HHL Algorithm to Solve Multivariate Polynomial Systems publication-title: Quantum doi: 10.22331/q-2023-07-26-1069 – volume: 52 start-page: 66 year: 2022 ident: ref_1 article-title: Quantum computing: A taxonomy, systematic review and future directions publication-title: Softw. Pract. Exp. doi: 10.1002/spe.3039 – volume: 17 start-page: 261 year: 2020 ident: ref_33 article-title: SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python publication-title: Nat. Methods doi: 10.1038/s41592-019-0686-2 – ident: ref_21 doi: 10.1007/3-540-48658-5 – ident: ref_31 – ident: ref_22 doi: 10.1007/978-3-642-03317-9 – ident: ref_29 – ident: ref_27 – ident: ref_2 – volume: 60 start-page: 1565 year: 2021 ident: ref_26 article-title: Quantum Algorithms for the Resiliency of Vectorial Boolean Functions publication-title: Int. J. Theor. Phys. doi: 10.1007/s10773-021-04779-z – ident: ref_5 doi: 10.1007/978-3-030-89432-0 – volume: 14 start-page: 2101 year: 2015 ident: ref_12 article-title: Quantum Differential Cryptanalysis publication-title: Quantum Inf. Process. doi: 10.1007/s11128-015-0983-3 – volume: 40 start-page: 1787 year: 2004 ident: ref_34 article-title: On the Binomial Confidence Interval and Probabilistic Robust Control publication-title: Automatica doi: 10.1016/j.automatica.2004.04.016 – volume: C-26 start-page: 819 year: 1977 ident: ref_24 article-title: A Recursive Algorithm for Sequency-Ordered Fast Walsh Transforms publication-title: IEEE Trans. Comput. doi: 10.1109/TC.1977.1674921 – ident: ref_17 – ident: ref_19 doi: 10.1007/3-540-47555-9 – volume: 70 start-page: 369 year: 2014 ident: ref_23 article-title: Linear hulls with correlation zero and linear cryptanalysis of block ciphers publication-title: Des. Codes Cryptogr. doi: 10.1007/s10623-012-9697-z – volume: 26 start-page: 404 year: 1934 ident: ref_30 article-title: The Use of Confidence or Fiducial Limits Illustrated in the Case of the Binomial publication-title: Biometrika doi: 10.1093/biomet/26.4.404 – volume: 2016 start-page: 71 year: 2016 ident: ref_11 article-title: Quantum Differential and Linear Cryptanalysis publication-title: IACR Trans. Symmetric Cryptol. doi: 10.46586/tosc.v2016.i1.71-94 – volume: 97 start-page: 63 year: 2023 ident: ref_18 article-title: Quantum linear cryptanalysis on a toy cipher publication-title: Pramana doi: 10.1007/s12043-023-02529-w – ident: ref_20 doi: 10.1007/3-540-48285-7 – volume: 73 start-page: 521 year: 2005 ident: ref_3 article-title: Shor’s factoring algorithm and modern cryptography. An illustration of the capabilities inherent in quantum computers publication-title: Am. J. Phys. doi: 10.1119/1.1891170 |
| SSID | ssj0002802968 |
| Score | 2.275362 |
| Snippet | In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many... |
| SourceID | doaj proquest crossref |
| SourceType | Open Website Aggregation Database Index Database |
| StartPage | 714 |
| SubjectTerms | Algorithms Approximation Asymptotic methods Bias Boolean Boolean functions Codes Complexity correlation in linear cryptanalysis Cryptography Data encryption linear approximation linear cryptanalysis Quantum computing quantum computing in cryptanalysis Random variables Success vectorial boolean functions Walsh transforms |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFA66efDiD1ScTslB8FTMkjRpTrKNDU9jiMJupUmaOXDd7DbB_96XNlNE8OKp0KYh9CV53_fy-j2EbhJnYpZRHVnuSMRlbCPtGI-MUtbkmRJUJ1WxCTkaJZOJGoeA2yqkVW73xGqjtgvjY-R3DKC8pFRxcr98i3zVKH-6Gkpo7KKmVyrjDdTsDUbjx68oC00IVSKp1RoZ8HvghzDizVxUk5f98EaVaP-vPblyNMPD_w7xCB0EiIm79Zw4Rjt5cYJMt8CDEPDGWyUSvHAYACDu-xIddVKcb1TWPzvg7usUul-_zPGsCO0KnyjiXwMOC2sE98uPJcDLurtT9DwcPPUfolBgITJMyHVkbC7B38fadqRRGtAYXHgGLNE5xQHp2A6xsdHUxLlWXtHYUu2IM4ZLm4PPO0ONYlHk5wg7ppkgwHdFxrgVcUYyJ4UGfNPRMbG8hW63Hzpd1joaKfAPb5L0p0laqOft8NXK619XNxblNA3LKeUdTVwCUM4qxaWjmcspkFdNtU6oS0QLtbcmSsOiXKXf9rn4-_El2qeAXeqslTZqrMtNfoX2zPt6tiqvwxz7BCSZ3pg priority: 102 providerName: ProQuest |
| Title | An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis |
| URI | https://www.proquest.com/docview/3149722940 https://doaj.org/article/41b0f8441d9947f2afe2210b2bb82f86 |
| Volume | 6 |
| WOSCitedRecordID | wos001383884800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2624-960X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002802968 issn: 2624-960X databaseCode: DOA dateStart: 20190101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2624-960X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002802968 issn: 2624-960X databaseCode: M~E dateStart: 20180101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2624-960X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002802968 issn: 2624-960X databaseCode: P5Z dateStart: 20210101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2624-960X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002802968 issn: 2624-960X databaseCode: BENPR dateStart: 20210101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 2624-960X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002802968 issn: 2624-960X databaseCode: PIMPY dateStart: 20210101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA4yPXgRRcXpHDkInopZkjbNcRsbetgoojC9lCZpdOK6sR-CF_92X5pONjx48ZJCmzbhvbTv-8Lr9xC6iq0OWUZVYLglARehCZRlPNBSGp1nMqIqLotNiOEwHo1kslHqy-WEeXlgb7gb3lLExhC0jZRcWJrZnAJNUVSpmNq4FNsG1LNBpt7KLSNCZRR7lUYGvB54Icx0NYnKRcu2olAp1v_rW1wGmP4hOqiQIW77GR2hnbw4Rrpd4F61T43XAiJ4ajHgNtx1lTV8LpvrNPf_KOD2-8sUKP_rBI-Lql_h8jvcbUA9YWnj7vxzBqjQP-4EPfZ7D93boKqLEGgWiWWgTS4gTIfKtISWCkAUHHgG5M5ayQGgmBYxoVZUh7mSTojYUGWJ1ZoLk0OoOkW1YlrkZwhbplhEgKZGGeMmCjOSWREpgCUtFRLD6-h6bad05uUvUqANzqLptkXrqOPM-NPLyVaXJ8CZaeXM9C9n1lFj7YS0epcWKQMSJyiVnJz_xxgXaJ8CMPEpKQ1UW85X-SXa0x_L8WLeRLud3jC5b5bLCdrBVw_aJHyGK8ndIHn6BtRf1GA |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB5VWyS48BAgFgr4AOIU4diOHweElqVVV21XeyhSOYX4VSrR7JLdgvqn-I2M8yiqkLj1wClS4kSy_WXm--zxDMArHV3BK2YzLyLNhCp8ZiMXmTPGu1AZyaxui02o-VyfnJjFFvwazsKksMrBJraG2i9dWiN_y5HKK8aMoO9X37NUNSrtrg4lNDpYHITLnyjZ1u9mH3F-XzO2t3s83c_6qgKZ41JtMueDQidXWJ8rZyxSELyICqVRjEage_c59YWzzBXBmpTG1zMbaXROKB_ylOgATf62QLDrEWwvZkeLz1erOkxTZqTuskNybijqURyhi3PZ_iz8mvdriwT85QNax7Z3738bkvtwt6fQZNJh_gFshfohuElNdvsFfTJkWiHLSJDgkmkqQdIF_aVGTXeYg0y-nWJ3Nl_PyVndt6tTIEx6DTU69oxMm8sV0ufuc4_g04306zGM6mUdngCJ3HJJUc_Ligsvi4pWUUmL_C23BfViDG-GiS1XXZ6QEvVVgkB5HQJj-JDm_apVyu_d3lg2p2VvLkqRWxo1UlVvjFCRVTEwFOeWWatZ1HIMOwMkyt7orMs_eHj678cv4fb-8dFheTibHzyDOwx5WhehswOjTXMRnsMt92Nztm5e9Pgm8OWm8fMbErE8ig |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NT9wwEB0hqKpeSquCuoW2PrTqKcKxHTs-ILRdWBVRrfbQSqiXEH9RpJJdsguIv8avY5wPKoTUG4eeIiVOJNvPM-854xmAT3mwGS-ZSZwINBEqc4kJXCRWa2d9qSUzeVNsQk0m-fGxnq7AbX8WJoZV9jaxMdRuZuMe-Q5HKq8Y04LuhC4sYro_3ptfJLGCVPzT2pfTaCFy5G-uUb4tdg_3ca4_MzY--DH6lnQVBhLLpVom1nmFDi8zLlVWG6QjeBElyqQQtEBX71LqMmuYzbzRMaWvYybQYK1Qzqcx6QGa_zWFGjOurmn2635_h-WUaZm3eSI51xSVKY7V5blslg1_4AebcgGPvEHj4sbr__PgvIKXHbEmw3YlvIYVX70BO6zIQbfNT_r8K2QWCNJeMoqFSdpQwNiobo94kOGfU-zO8vc5Oau6dlXsanwNlTv2jIzqmzmS6vZzG_DzSfq1CavVrPJvgQRuuKSo8mXJhZNZScugpEFWl5qMOjGAL_0kF_M2e0iBqivCoXgIhwF8jRi4bxWzfjc3ZvVp0RmRQqSGhhwJrNNaqMDK4BlKdsOMyVnI5QC2e3gUnSlaFH-x8e7fjz_CcwRN8f1wcrQFLxiStzZsZxtWl_Wlfw_P7NXybFF_aIBO4OSpwXMHIgJD7Q |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Extended+Analysis+of+the+Correlation+Extraction+Algorithm+in+the+Context+of+Linear+Cryptanalysis&rft.jtitle=Quantum+reports&rft.au=Graebnitz%2C+Christoph&rft.au=Pickel%2C+Valentin&rft.au=Eble%2C+Holger&rft.au=Morgner%2C+Frank&rft.date=2024-12-01&rft.issn=2624-960X&rft.eissn=2624-960X&rft.volume=6&rft.issue=4&rft.spage=714&rft.epage=734&rft_id=info:doi/10.3390%2Fquantum6040043&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_quantum6040043 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2624-960X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2624-960X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2624-960X&client=summon |