Pages that link to "Item:Q484333"
From MaRDI portal
The following pages link to A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (Q484333):
Displaying 16 items.
- Related-key analysis of generalized Feistel networks with expanding round functions (Q826269) (← links)
- PRINCEv2. More security for (almost) no overhead (Q832374) (← links)
- The retracing boomerang attack (Q2055612) (← links)
- Provable related-key security of contracting Feistel networks (Q2057179) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- Strong continuous non-malleable encoding schemes with tamper-detection (Q2195381) (← links)
- Investigations on \(c\)-boomerang uniformity and perfect nonlinearity (Q2231773) (← links)
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications (Q4639496) (← links)
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} (Q6135400) (← links)
- Optimizing rectangle attacks: a unified and generic framework for key recovery (Q6135405) (← links)
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery (Q6536744) (← links)
- The retracing boomerang attack, with application to reduced-round AES (Q6595850) (← links)
- Quantum boomerang attacks and some applications (Q6618598) (← links)
- Another look at differential-linear attacks (Q6619841) (← links)
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond (Q6636397) (← links)
- Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT (Q6652909) (← links)