A Framework for Automated Independent-Biclique Cryptanalysis
From MaRDI portal
Publication:2946897
DOI10.1007/978-3-662-43933-3_29zbMath1321.94031OpenAlexW227336366MaRDI QIDQ2946897
Eik List, Christian Forler, Jakob Wenzel, Stefan Lucks, Farzaneh Abed
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_29
Related Items (4)
New criterion for diffusion property and applications to improved GFS and EGFN ⋮ Improving the Biclique Cryptanalysis of AES ⋮ Bicliques with Minimal Data and Time Complexity for AES ⋮ Finding three-subset division property for ciphers with complex linear layers
Uses Software
Cites Work
- Unnamed Item
- Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128
- Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher
- Narrow-Bicliques: Cryptanalysis of Full IDEA
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
- Biclique Cryptanalysis of the Full AES
- Biclique Attack on the Full HIGHT
- Preimage Attacks on Step-Reduced MD5
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Differential Propagation Analysis of Keccak
This page was built for publication: A Framework for Automated Independent-Biclique Cryptanalysis