Biclique Cryptanalysis of the Full AES

From MaRDI portal
Publication:3102196

DOI10.1007/978-3-642-25385-0_19zbMath1227.94032OpenAlexW1515595447MaRDI QIDQ3102196

Christian Rechberger, Andrey Bogdanov, Dmitry Khovratovich

Publication date: 2 December 2011

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_19




Related Items

A note on an infeasible linearization of some block ciphersOn the cost of ASIC hardware crackers: a SHA-1 case studyMeet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksA survey on implementation of lightweight block ciphers for resource constraints devicesNSA and dual EC\(\_\)DRBG: Déjà vu all over again?Meet-in-the-middle attacks on 10-round AES-256The \(t\)-wise independence of substitution-permutation networksCollision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis TechniqueExtracts from the SHA-3 CompetitionAll Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle ApproachNew Attacks on Feistel Structures with Improved Memory ComplexitiesOn forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computerKey recovery attacks on iterated Even-Mansour encryption schemesNew criterion for diffusion property and applications to improved GFS and EGFNImproving the Biclique Cryptanalysis of AESBad Directions in Cryptographic Hash FunctionsFormat-Preserving Encryption Algorithms Using Families of Tweakable BlockciphersBicliques with Minimal Data and Time Complexity for AESMeet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3Security Analysis of PRINCETowards Understanding the Known-Key Security of Block CiphersExhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESA Framework for Automated Independent-Biclique CryptanalysisA Higher Order Key Partitioning Attack with Application to LBlockBiclique cryptanalysis of LBlock and TWINEWhat is the effective key length for a block cipher: an attack on every practical block cipherThe DBlock family of block ciphersMeet-in-the-middle preimage attacks on sponge-based hashingGeneralized MitM attacks on full TWINETriangulating rebound attack on AES-like hashingKey structures: improved related-key boomerang attack against the full AES-256A New Design of Substitution Box with Ideal Strict Avalanche CriterionSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionUniversal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption AlgorithmRevisiting related-key boomerang attacks on AES using computer-aided toolDifferential meet-in-the-middle cryptanalysisCryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphersImproved truncated differential distinguishers of AES with concrete S-boxAn algebraic attack on ciphers with low-degree round functions: application to full MiMCBiclique Attack of Block Cipher SKINNYMultidimensional meet-in-the-middle attack and its applications to KATAN32/48/64Using quantum key distribution for cryptographic purposes: a surveyAn ID-based signcryption scheme with compartmented secret sharing for unsigncryptionAKF: a key alternating Feistel scheme for lightweight cipher designsSystem-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memoryОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESSolving hybrid Boolean constraints in continuous space via multilinear Fourier expansionsMaking the impossible possibleRobust Pseudo-Random Number Generators with Input Secure Against Side-Channel AttacksImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesRevisiting key schedule's diffusion in relation with round function's diffusionSymmetric cryptoalgorithms in the residue number systemRotational rebound attacks on reduced SkeinAutomatic search of meet-in-the-middle preimage attacks on AES-like hashingA novel key scheduling scheme for AES algorithmNew Insights on AES-Like SPN CiphersThe rebound attack and subspace distinguishers: application to WhirlpoolPersistent fault analysis with few encryptionsBiclique cryptanalysis on lightweight block cipher: HIGHT and PiccoloQuantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AESOn a generalization of substitution-permutation networks: the HADES design strategy