Computing AES related-key differential characteristics with constraint programming
From MaRDI portal
Publication:2289026
DOI10.1016/j.artint.2019.103183zbMath1482.94049OpenAlexW2981623187MaRDI QIDQ2289026
Marine Minier, David Gérault, Christine Solnon, Pascal Lafourcade
Publication date: 20 January 2020
Published in: Artificial Intelligence (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.artint.2019.103183
Related Items
And Rijndael? Automatic related-key differential analysis of Rijndael, Automatic boomerang attacks search on Rijndael, Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An MDD-based generalized arc consistency algorithm for positive and negative table constraints and some global constraints
- Boomerang Connectivity Table: a new cryptanalysis tool
- Cube attacks on non-blackbox polynomials based on division property
- Revisiting AES related-key differential attacks with constraint programming
- Automatic search of bit-based division property for ARX ciphers and word-based division property
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Related-Key Cryptanalysis of Midori
- Distinguisher and Related-Key Attack on the Full AES-256
- A Way to Simplify Truth Functions
- Observations on the SIMON Block Cipher Family
- GAC Via Unit Propagation
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Graph-Based Algorithms for Boolean Function Manipulation
- Differential Cryptanalysis of Feal and N-Hash
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- Maximum distance<tex>q</tex>-nary codes