An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis

In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers. Since these linear cryptanalytic techniques require exploitable linear approximations to relate the inp...

Full description

Saved in:
Bibliographic Details
Published in:Quantum reports Vol. 6; no. 4; pp. 714 - 734
Main Authors: Graebnitz, Christoph, Pickel, Valentin, Eble, Holger, Morgner, Frank, Hattenbach, Hannes, Margraf, Marian
Format: Journal Article
Language:English
Published: Basel MDPI AG 01.12.2024
Subjects:
ISSN:2624-960X, 2624-960X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers. Since these linear cryptanalytic techniques require exploitable linear approximations to relate the input and output of vectorial Boolean functions, e.g., the plaintext, ciphertext, and key of the cryptographic function, finding these approximations is essential. For this purpose, the Correlation Extraction Algorithm (CEA), which leverages the emerging field of quantum computing, appears promising. However, there has been no comprehensive analysis of the CEA regarding finding an exploitable linear approximation for linear cryptanalysis. In this paper, we conduct a thorough theoretical analysis of the CEA. We aim to investigate its potential in finding a linear approximation with prescribed statistical characteristics. To support our theoretical work, we also present the results of a small empirical study based on a computer simulation. The analysis in this paper shows that an approach that uses the CEA to find exploitable linear approximations has an asymptotic advantage, reducing a linear factor to a logarithmic one in terms of time complexity, and an exponential advantage in terms of space complexity compared to a classical approach that uses the fast Walsh transform. Furthermore, we show that in specific scenarios, CEA can exponentially reduce the search space for exploitable linear approximations in terms of the number of input bits of the cipher. Neglecting the unresolved issue of efficiently checking the property of linear approximations measured by the CEA, our results indicate that the CEA can support the linear cryptanalysis of vectorial Boolean functions with relatively few (e.g., n≤32) output bits.
AbstractList In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many sophisticated cryptographic ciphers. Since these linear cryptanalytic techniques require exploitable linear approximations to relate the input and output of vectorial Boolean functions, e.g., the plaintext, ciphertext, and key of the cryptographic function, finding these approximations is essential. For this purpose, the Correlation Extraction Algorithm (CEA), which leverages the emerging field of quantum computing, appears promising. However, there has been no comprehensive analysis of the CEA regarding finding an exploitable linear approximation for linear cryptanalysis. In this paper, we conduct a thorough theoretical analysis of the CEA. We aim to investigate its potential in finding a linear approximation with prescribed statistical characteristics. To support our theoretical work, we also present the results of a small empirical study based on a computer simulation. The analysis in this paper shows that an approach that uses the CEA to find exploitable linear approximations has an asymptotic advantage, reducing a linear factor to a logarithmic one in terms of time complexity, and an exponential advantage in terms of space complexity compared to a classical approach that uses the fast Walsh transform. Furthermore, we show that in specific scenarios, CEA can exponentially reduce the search space for exploitable linear approximations in terms of the number of input bits of the cipher. Neglecting the unresolved issue of efficiently checking the property of linear approximations measured by the CEA, our results indicate that the CEA can support the linear cryptanalysis of vectorial Boolean functions with relatively few (e.g., n≤32) output bits.
Author Pickel, Valentin
Eble, Holger
Graebnitz, Christoph
Morgner, Frank
Margraf, Marian
Hattenbach, Hannes
Author_xml – sequence: 1
  givenname: Christoph
  surname: Graebnitz
  fullname: Graebnitz, Christoph
– sequence: 2
  givenname: Valentin
  surname: Pickel
  fullname: Pickel, Valentin
– sequence: 3
  givenname: Holger
  surname: Eble
  fullname: Eble, Holger
– sequence: 4
  givenname: Frank
  surname: Morgner
  fullname: Morgner, Frank
– sequence: 5
  givenname: Hannes
  orcidid: 0000-0001-6783-8180
  surname: Hattenbach
  fullname: Hattenbach, Hannes
– sequence: 6
  givenname: Marian
  orcidid: 0009-0005-8577-1318
  surname: Margraf
  fullname: Margraf, Marian
BookMark eNpVkUtLAzEUhYMoWGu3rgdct95kMo8sS6laKLhRcBfybKdMkzbJQPvvnT4QXZ3D5bvncjkP6NZ5ZxB6wjDJcwYv-0641G1LoAA0v0EDUhI6ZiV83_7x92gU4wYASA2ElfUAqanL5odknDY6mzrRHmMTM2-ztDbZzIdgWpEaf4aCUGc7bVc-NGm9zRp35Vwyh3RaWzbOiJDNwnGXxDXuEd1Z0UYzuuoQfb3OP2fv4-XH22I2XY5VXlZprLSpMGGF1LhSTEKd90IFhtJaRgtcaAy6UJKowkjGoCSaSAtWKVppg0k-RItLrvZiw3eh2Ypw5F40_DzwYcVFSI1qDadYgq0pxZoxWlkirCEEgyRS1sTWZZ_1fMnaBb_vTEx847vQPxR5jimrCGEUempyoVTwMQZjf69i4Kde-P9e8h96OIQy
Cites_doi 10.1007/s11128-023-03921-6
10.1007/s11424-020-0028-6
10.1007/s10623-023-01280-y
10.1007/978-3-319-29360-8
10.1090/gsm/047
10.1209/0295-5075/132/40001
10.1109/ICCES54183.2022.9835864
10.3390/sym16091124
10.1007/s11128-019-2299-1
10.22331/q-2023-07-26-1069
10.1002/spe.3039
10.1038/s41592-019-0686-2
10.1007/3-540-48658-5
10.1007/978-3-642-03317-9
10.1007/s10773-021-04779-z
10.1007/978-3-030-89432-0
10.1007/s11128-015-0983-3
10.1016/j.automatica.2004.04.016
10.1109/TC.1977.1674921
10.1007/3-540-47555-9
10.1007/s10623-012-9697-z
10.1093/biomet/26.4.404
10.46586/tosc.v2016.i1.71-94
10.1007/s12043-023-02529-w
10.1007/3-540-48285-7
10.1119/1.1891170
ContentType Journal Article
Copyright 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOA
DOI 10.3390/quantum6040043
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One
ProQuest Central Korea
SciTech Premium Collection
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList CrossRef
Publicly Available Content Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
EISSN 2624-960X
EndPage 734
ExternalDocumentID oai_doaj_org_article_41b0f8441d9947f2afe2210b2bb82f86
10_3390_quantum6040043
GroupedDBID AADQD
AAFWJ
AAYXX
AFFHD
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
BENPR
BGLVJ
CCPQU
CITATION
GROUPED_DOAJ
HCIFZ
IAO
IGS
ITC
MODMG
M~E
OK1
PHGZM
PHGZT
PIMPY
PQGLB
8FE
8FG
ABUWG
AZQEC
DWQXO
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c367t-cde71295bd17c9b0837c94a106ff94515d10d5cb2c5eb99062d2bf0fcc47de123
IEDL.DBID DOA
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001383884800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2624-960X
IngestDate Fri Oct 03 12:26:46 EDT 2025
Sun Jul 13 04:00:33 EDT 2025
Sat Nov 29 07:13:04 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c367t-cde71295bd17c9b0837c94a106ff94515d10d5cb2c5eb99062d2bf0fcc47de123
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0009-0005-8577-1318
0000-0001-6783-8180
OpenAccessLink https://doaj.org/article/41b0f8441d9947f2afe2210b2bb82f86
PQID 3149722940
PQPubID 5046865
PageCount 21
ParticipantIDs doaj_primary_oai_doaj_org_article_41b0f8441d9947f2afe2210b2bb82f86
proquest_journals_3149722940
crossref_primary_10_3390_quantum6040043
PublicationCentury 2000
PublicationDate 2024-12-01
PublicationDateYYYYMMDD 2024-12-01
PublicationDate_xml – month: 12
  year: 2024
  text: 2024-12-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Quantum reports
PublicationYear 2024
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Bogdanov (ref_23) 2014; 70
Virtanen (ref_33) 2020; 17
Ding (ref_10) 2023; 7
ref_32
ref_31
Chen (ref_9) 2022; 35
ref_19
ref_17
ref_15
Li (ref_26) 2021; 60
Clopper (ref_30) 1934; 26
Kaplan (ref_11) 2016; 2016
Malviya (ref_16) 2020; 132
Zhou (ref_12) 2015; 14
ref_22
Brown (ref_24) 1977; C-26
ref_21
ref_20
Gill (ref_1) 2022; 52
Chen (ref_34) 2004; 40
Gerjuoy (ref_3) 2005; 73
Zou (ref_14) 2023; 22
ref_2
ref_29
ref_28
Proos (ref_4) 2003; 3
ref_27
Burek (ref_8) 2022; 10
Malviya (ref_18) 2023; 97
David (ref_13) 2024; 92
ref_5
ref_7
Cui (ref_25) 2019; 18
ref_6
References_xml – volume: 3
  start-page: 317
  year: 2003
  ident: ref_4
  article-title: Shor’s Discrete Logarithm Quantum Algorithm for Elliptic Curves
  publication-title: Quantum Inf. Comput.
– volume: 22
  start-page: 171
  year: 2023
  ident: ref_14
  article-title: New Results on Quantum Boomerang Attacks
  publication-title: Quantum Inf. Process.
  doi: 10.1007/s11128-023-03921-6
– volume: 35
  start-page: 373
  year: 2022
  ident: ref_9
  article-title: Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
  publication-title: J. Syst. Sci. Complex.
  doi: 10.1007/s11424-020-0028-6
– ident: ref_32
– volume: 10
  start-page: 678
  year: 2022
  ident: ref_8
  article-title: Algebraic Attacks on Block Ciphers Using Quantum Annealing
  publication-title: IEEE Trans. Emerg. Top. Comput.
– volume: 92
  start-page: 723
  year: 2024
  ident: ref_13
  article-title: Quantum Impossible Differential Attacks: Applications to AES and SKINNY
  publication-title: Des. Codes Cryptogr.
  doi: 10.1007/s10623-023-01280-y
– ident: ref_6
  doi: 10.1007/978-3-319-29360-8
– ident: ref_28
  doi: 10.1090/gsm/047
– volume: 132
  start-page: 40001
  year: 2020
  ident: ref_16
  article-title: Linear approximation of a vectorial Boolean function using quantum computing
  publication-title: EPL (Europhys. Lett.)
  doi: 10.1209/0295-5075/132/40001
– ident: ref_7
  doi: 10.1109/ICCES54183.2022.9835864
– ident: ref_15
  doi: 10.3390/sym16091124
– volume: 18
  start-page: 182
  year: 2019
  ident: ref_25
  article-title: Quantum cryptographic property testing of multi-output Boolean functions
  publication-title: Quantum Inf. Process.
  doi: 10.1007/s11128-019-2299-1
– volume: 7
  start-page: 1069
  year: 2023
  ident: ref_10
  article-title: Limitations of the Macaulay Matrix Approach for Using the HHL Algorithm to Solve Multivariate Polynomial Systems
  publication-title: Quantum
  doi: 10.22331/q-2023-07-26-1069
– volume: 52
  start-page: 66
  year: 2022
  ident: ref_1
  article-title: Quantum computing: A taxonomy, systematic review and future directions
  publication-title: Softw. Pract. Exp.
  doi: 10.1002/spe.3039
– volume: 17
  start-page: 261
  year: 2020
  ident: ref_33
  article-title: SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python
  publication-title: Nat. Methods
  doi: 10.1038/s41592-019-0686-2
– ident: ref_21
  doi: 10.1007/3-540-48658-5
– ident: ref_31
– ident: ref_22
  doi: 10.1007/978-3-642-03317-9
– ident: ref_29
– ident: ref_27
– ident: ref_2
– volume: 60
  start-page: 1565
  year: 2021
  ident: ref_26
  article-title: Quantum Algorithms for the Resiliency of Vectorial Boolean Functions
  publication-title: Int. J. Theor. Phys.
  doi: 10.1007/s10773-021-04779-z
– ident: ref_5
  doi: 10.1007/978-3-030-89432-0
– volume: 14
  start-page: 2101
  year: 2015
  ident: ref_12
  article-title: Quantum Differential Cryptanalysis
  publication-title: Quantum Inf. Process.
  doi: 10.1007/s11128-015-0983-3
– volume: 40
  start-page: 1787
  year: 2004
  ident: ref_34
  article-title: On the Binomial Confidence Interval and Probabilistic Robust Control
  publication-title: Automatica
  doi: 10.1016/j.automatica.2004.04.016
– volume: C-26
  start-page: 819
  year: 1977
  ident: ref_24
  article-title: A Recursive Algorithm for Sequency-Ordered Fast Walsh Transforms
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.1977.1674921
– ident: ref_17
– ident: ref_19
  doi: 10.1007/3-540-47555-9
– volume: 70
  start-page: 369
  year: 2014
  ident: ref_23
  article-title: Linear hulls with correlation zero and linear cryptanalysis of block ciphers
  publication-title: Des. Codes Cryptogr.
  doi: 10.1007/s10623-012-9697-z
– volume: 26
  start-page: 404
  year: 1934
  ident: ref_30
  article-title: The Use of Confidence or Fiducial Limits Illustrated in the Case of the Binomial
  publication-title: Biometrika
  doi: 10.1093/biomet/26.4.404
– volume: 2016
  start-page: 71
  year: 2016
  ident: ref_11
  article-title: Quantum Differential and Linear Cryptanalysis
  publication-title: IACR Trans. Symmetric Cryptol.
  doi: 10.46586/tosc.v2016.i1.71-94
– volume: 97
  start-page: 63
  year: 2023
  ident: ref_18
  article-title: Quantum linear cryptanalysis on a toy cipher
  publication-title: Pramana
  doi: 10.1007/s12043-023-02529-w
– ident: ref_20
  doi: 10.1007/3-540-48285-7
– volume: 73
  start-page: 521
  year: 2005
  ident: ref_3
  article-title: Shor’s factoring algorithm and modern cryptography. An illustration of the capabilities inherent in quantum computers
  publication-title: Am. J. Phys.
  doi: 10.1119/1.1891170
SSID ssj0002802968
Score 2.275362
Snippet In cryptography, techniques and tools developed in the subfield of linear cryptanalysis have previously successfully been used to allow attackers to break many...
SourceID doaj
proquest
crossref
SourceType Open Website
Aggregation Database
Index Database
StartPage 714
SubjectTerms Algorithms
Approximation
Asymptotic methods
Bias
Boolean
Boolean functions
Codes
Complexity
correlation in linear cryptanalysis
Cryptography
Data encryption
linear approximation
linear cryptanalysis
Quantum computing
quantum computing in cryptanalysis
Random variables
Success
vectorial boolean functions
Walsh transforms
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFA66efDiD1ScTslB8FTMkjRpTrKNDU9jiMJupUmaOXDd7DbB_96XNlNE8OKp0KYh9CV53_fy-j2EbhJnYpZRHVnuSMRlbCPtGI-MUtbkmRJUJ1WxCTkaJZOJGoeA2yqkVW73xGqjtgvjY-R3DKC8pFRxcr98i3zVKH-6Gkpo7KKmVyrjDdTsDUbjx68oC00IVSKp1RoZ8HvghzDizVxUk5f98EaVaP-vPblyNMPD_w7xCB0EiIm79Zw4Rjt5cYJMt8CDEPDGWyUSvHAYACDu-xIddVKcb1TWPzvg7usUul-_zPGsCO0KnyjiXwMOC2sE98uPJcDLurtT9DwcPPUfolBgITJMyHVkbC7B38fadqRRGtAYXHgGLNE5xQHp2A6xsdHUxLlWXtHYUu2IM4ZLm4PPO0ONYlHk5wg7ppkgwHdFxrgVcUYyJ4UGfNPRMbG8hW63Hzpd1joaKfAPb5L0p0laqOft8NXK619XNxblNA3LKeUdTVwCUM4qxaWjmcspkFdNtU6oS0QLtbcmSsOiXKXf9rn4-_El2qeAXeqslTZqrMtNfoX2zPt6tiqvwxz7BCSZ3pg
  priority: 102
  providerName: ProQuest
Title An Extended Analysis of the Correlation Extraction Algorithm in the Context of Linear Cryptanalysis
URI https://www.proquest.com/docview/3149722940
https://doaj.org/article/41b0f8441d9947f2afe2210b2bb82f86
Volume 6
WOSCitedRecordID wos001383884800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2624-960X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002802968
  issn: 2624-960X
  databaseCode: DOA
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2624-960X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002802968
  issn: 2624-960X
  databaseCode: M~E
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 2624-960X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002802968
  issn: 2624-960X
  databaseCode: P5Z
  dateStart: 20210101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2624-960X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002802968
  issn: 2624-960X
  databaseCode: BENPR
  dateStart: 20210101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2624-960X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002802968
  issn: 2624-960X
  databaseCode: PIMPY
  dateStart: 20210101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA4yPXgRRcXpHDkInopZkjbNcRsbetgoojC9lCZpdOK6sR-CF_92X5pONjx48ZJCmzbhvbTv-8Lr9xC6iq0OWUZVYLglARehCZRlPNBSGp1nMqIqLotNiOEwHo1kslHqy-WEeXlgb7gb3lLExhC0jZRcWJrZnAJNUVSpmNq4FNsG1LNBpt7KLSNCZRR7lUYGvB54Icx0NYnKRcu2olAp1v_rW1wGmP4hOqiQIW77GR2hnbw4Rrpd4F61T43XAiJ4ajHgNtx1lTV8LpvrNPf_KOD2-8sUKP_rBI-Lql_h8jvcbUA9YWnj7vxzBqjQP-4EPfZ7D93boKqLEGgWiWWgTS4gTIfKtISWCkAUHHgG5M5ayQGgmBYxoVZUh7mSTojYUGWJ1ZoLk0OoOkW1YlrkZwhbplhEgKZGGeMmCjOSWREpgCUtFRLD6-h6bad05uUvUqANzqLptkXrqOPM-NPLyVaXJ8CZaeXM9C9n1lFj7YS0epcWKQMSJyiVnJz_xxgXaJ8CMPEpKQ1UW85X-SXa0x_L8WLeRLud3jC5b5bLCdrBVw_aJHyGK8ndIHn6BtRf1GA
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB5VWyS48BAgFgr4AOIU4diOHweElqVVV21XeyhSOYX4VSrR7JLdgvqn-I2M8yiqkLj1wClS4kSy_WXm--zxDMArHV3BK2YzLyLNhCp8ZiMXmTPGu1AZyaxui02o-VyfnJjFFvwazsKksMrBJraG2i9dWiN_y5HKK8aMoO9X37NUNSrtrg4lNDpYHITLnyjZ1u9mH3F-XzO2t3s83c_6qgKZ41JtMueDQidXWJ8rZyxSELyICqVRjEage_c59YWzzBXBmpTG1zMbaXROKB_ylOgATf62QLDrEWwvZkeLz1erOkxTZqTuskNybijqURyhi3PZ_iz8mvdriwT85QNax7Z3738bkvtwt6fQZNJh_gFshfohuElNdvsFfTJkWiHLSJDgkmkqQdIF_aVGTXeYg0y-nWJ3Nl_PyVndt6tTIEx6DTU69oxMm8sV0ufuc4_g04306zGM6mUdngCJ3HJJUc_Ligsvi4pWUUmL_C23BfViDG-GiS1XXZ6QEvVVgkB5HQJj-JDm_apVyu_d3lg2p2VvLkqRWxo1UlVvjFCRVTEwFOeWWatZ1HIMOwMkyt7orMs_eHj678cv4fb-8dFheTibHzyDOwx5WhehswOjTXMRnsMt92Nztm5e9Pgm8OWm8fMbErE8ig
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NT9wwEB0hqKpeSquCuoW2PrTqKcKxHTs-ILRdWBVRrfbQSqiXEH9RpJJdsguIv8avY5wPKoTUG4eeIiVOJNvPM-854xmAT3mwGS-ZSZwINBEqc4kJXCRWa2d9qSUzeVNsQk0m-fGxnq7AbX8WJoZV9jaxMdRuZuMe-Q5HKq8Y04LuhC4sYro_3ptfJLGCVPzT2pfTaCFy5G-uUb4tdg_3ca4_MzY--DH6lnQVBhLLpVom1nmFDi8zLlVWG6QjeBElyqQQtEBX71LqMmuYzbzRMaWvYybQYK1Qzqcx6QGa_zWFGjOurmn2635_h-WUaZm3eSI51xSVKY7V5blslg1_4AebcgGPvEHj4sbr__PgvIKXHbEmw3YlvIYVX70BO6zIQbfNT_r8K2QWCNJeMoqFSdpQwNiobo94kOGfU-zO8vc5Oau6dlXsanwNlTv2jIzqmzmS6vZzG_DzSfq1CavVrPJvgQRuuKSo8mXJhZNZScugpEFWl5qMOjGAL_0kF_M2e0iBqivCoXgIhwF8jRi4bxWzfjc3ZvVp0RmRQqSGhhwJrNNaqMDK4BlKdsOMyVnI5QC2e3gUnSlaFH-x8e7fjz_CcwRN8f1wcrQFLxiStzZsZxtWl_Wlfw_P7NXybFF_aIBO4OSpwXMHIgJD7Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Extended+Analysis+of+the+Correlation+Extraction+Algorithm+in+the+Context+of+Linear+Cryptanalysis&rft.jtitle=Quantum+reports&rft.au=Graebnitz%2C+Christoph&rft.au=Pickel%2C+Valentin&rft.au=Eble%2C+Holger&rft.au=Morgner%2C+Frank&rft.date=2024-12-01&rft.issn=2624-960X&rft.eissn=2624-960X&rft.volume=6&rft.issue=4&rft.spage=714&rft.epage=734&rft_id=info:doi/10.3390%2Fquantum6040043&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_quantum6040043
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2624-960X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2624-960X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2624-960X&client=summon