More accurate results on the provable security of AES against impossible differential cryptanalysis
From MaRDI portal
Publication:2334448
DOI10.1007/s10623-019-00660-7zbMath1423.94112OpenAlexW2955859497WikidataQ127575521 ScholiaQ127575521MaRDI QIDQ2334448
Publication date: 7 November 2019
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-019-00660-7
Related Items (4)
Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting ⋮ Impossible differential cryptanalysis on reduced-round PRINCEcore ⋮ Bounding the length of impossible differentials for SPN block ciphers
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part II
- The block cipher companion.
- A unified method for finding impossible differentials of block cipher structures
- Impossible differential cryptanalysis using matrix method
- A construction of a cipher from a single pseudorandom permutation.
- Upper bound of the length of truncated impossible differentials for AES
- Making the impossible possible
- Yoyo tricks with AES
- Efficient slide attacks
- Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis
- New Insights on AES-Like SPN Ciphers
- Bounds in Shallows and in Miseries
- Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- Nonlinear Invariant Attack
- Improved Impossible Differential Cryptanalysis of 7-Round AES-128
- Understanding Two-Round Differentials in AES
- Markov Ciphers and Differential Cryptanalysis
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Note on Impossible Differential Attacks
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- A New Structural-Differential Property of 5-Round AES
- On the Role of Key Schedules in Attacks on Iterated Ciphers
This page was built for publication: More accurate results on the provable security of AES against impossible differential cryptanalysis