Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
From MaRDI portal
Publication:2946895
DOI10.1007/978-3-662-43933-3_28zbMath1321.94053OpenAlexW1409313141MaRDI QIDQ2946895
Patrick Derbez, Pierre-Alain Fouque
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_28
Related Items
Meet-in-the-middle attacks on 10-round AES-256 ⋮ General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE ⋮ Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool ⋮ Note on Impossible Differential Attacks ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ Making the impossible possible ⋮ Linearly equivalent s-boxes and the division property ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
Cites Work
- Unnamed Item
- Unnamed Item
- Low-Data Complexity Attacks on AES
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Improved Impossible Differential Cryptanalysis of 7-Round AES-128
- Biclique Cryptanalysis of the Full AES
- Distinguisher and Related-Key Attack on the Full AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Automatic Search of Attacks on Round-Reduced AES and Applications
- New Impossible Differential Attacks on AES