Yoyo tricks with AES
From MaRDI portal
Publication:2412874
DOI10.1007/978-3-319-70694-8_8zbMath1420.94094OpenAlexW2769426629MaRDI QIDQ2412874
Sondre Rønjom, Tor Helleseth, Navid Ghaedi Bardeh
Publication date: 6 April 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-70694-8_8
AESkey-recoverysecret-key distinguisherimpossible differencesSubstitution Permutation Networks(SPNs)zero-differences
Related Items (18)
MixColumns Coefficient Property and Security of the AES with A Secret S-Box ⋮ Cryptanalysis of FlexAEAD ⋮ Mixture integral attacks on reduced-round AES with a known/secret S-box ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Improved key-recovery attacks on reduced-round WEM-8 ⋮ Structural evaluation of AES-like ciphers against mixture differential cryptanalysis ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls ⋮ On the primitivity of the AES-128 key-schedule ⋮ Truncated differential properties of the diagonal set of inputs for 5-round AES ⋮ Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ Towards key-dependent integral and impossible differential distinguishers on 5-round AES ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ The retracing boomerang attack ⋮ Revisiting Gilbert's known-key distinguisher ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis ⋮ TNT: how to tweak a block cipher
This page was built for publication: Yoyo tricks with AES