Revisiting AES related-key differential attacks with constraint programming
From MaRDI portal
Publication:1799563
DOI10.1016/j.ipl.2018.07.001zbMath1481.94101OpenAlexW2824860271MaRDI QIDQ1799563
Marine Minier, Pascal Lafourcade, Christine Solnon, David Gérault
Publication date: 19 October 2018
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2018.07.001
Related Items (7)
A SAT-Based Approach for Index Calculus on Binary Elliptic Curves ⋮ Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128 ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Variants of the AES key schedule for better truncated differential bounds ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ Revisiting AES related-key differential attacks with constraint programming
Uses Software
Cites Work
- Unnamed Item
- Revisiting AES related-key differential attacks with constraint programming
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- Distinguisher and Related-Key Attack on the Full AES-256
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Differential Cryptanalysis of Feal and N-Hash
- Known-Key Distinguishers for Some Block Ciphers
This page was built for publication: Revisiting AES related-key differential attacks with constraint programming