Biclique Cryptanalysis of the Full AES
From MaRDI portal
Publication:3102196
DOI10.1007/978-3-642-25385-0_19zbMath1227.94032OpenAlexW1515595447MaRDI QIDQ3102196
Christian Rechberger, Andrey Bogdanov, Dmitry Khovratovich
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_19
Related Items
A note on an infeasible linearization of some block ciphers ⋮ On the cost of ASIC hardware crackers: a SHA-1 case study ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ NSA and dual EC\(\_\)DRBG: Déjà vu all over again? ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique ⋮ Extracts from the SHA-3 Competition ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ New Attacks on Feistel Structures with Improved Memory Complexities ⋮ On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer ⋮ Key recovery attacks on iterated Even-Mansour encryption schemes ⋮ New criterion for diffusion property and applications to improved GFS and EGFN ⋮ Improving the Biclique Cryptanalysis of AES ⋮ Bad Directions in Cryptographic Hash Functions ⋮ Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers ⋮ Bicliques with Minimal Data and Time Complexity for AES ⋮ Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 ⋮ Security Analysis of PRINCE ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES ⋮ A Framework for Automated Independent-Biclique Cryptanalysis ⋮ A Higher Order Key Partitioning Attack with Application to LBlock ⋮ Biclique cryptanalysis of LBlock and TWINE ⋮ What is the effective key length for a block cipher: an attack on every practical block cipher ⋮ The DBlock family of block ciphers ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Generalized MitM attacks on full TWINE ⋮ Triangulating rebound attack on AES-like hashing ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ A New Design of Substitution Box with Ideal Strict Avalanche Criterion ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ Biclique Attack of Block Cipher SKINNY ⋮ Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 ⋮ Using quantum key distribution for cryptographic purposes: a survey ⋮ An ID-based signcryption scheme with compartmented secret sharing for unsigncryption ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ Solving hybrid Boolean constraints in continuous space via multilinear Fourier expansions ⋮ Making the impossible possible ⋮ Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion ⋮ Symmetric cryptoalgorithms in the residue number system ⋮ Rotational rebound attacks on reduced Skein ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ A novel key scheduling scheme for AES algorithm ⋮ New Insights on AES-Like SPN Ciphers ⋮ The rebound attack and subspace distinguishers: application to Whirlpool ⋮ Persistent fault analysis with few encryptions ⋮ Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo ⋮ Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES ⋮ On a generalization of substitution-permutation networks: the HADES design strategy