The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts
From MaRDI portal
Publication:2178861
DOI10.1007/978-3-030-34618-8_12zbMath1455.94118OpenAlexW2990731611MaRDI QIDQ2178861
Sondre Rønjom, Navid Ghaedi Bardeh
Publication date: 11 May 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-34618-8_12
differential cryptanalysisAESSPNexchange-equivalence attacksexchange-equivalence classexchange-invariant setssecret-key model
Related Items (11)
MixColumns Coefficient Property and Security of the AES with A Secret S-Box ⋮ Mixture integral attacks on reduced-round AES with a known/secret S-box ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Structural evaluation of AES-like ciphers against mixture differential cryptanalysis ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ On the primitivity of the AES-128 key-schedule ⋮ Truncated differential properties of the diagonal set of inputs for 5-round AES ⋮ Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ A theoretical investigation on the distinguishers of Salsa and ChaCha ⋮ TNT: how to tweak a block cipher
This page was built for publication: The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts