Understanding Two-Round Differentials in AES
From MaRDI portal
Publication:3541880
DOI10.1007/11832072_6zbMath1152.94413OpenAlexW1886859749MaRDI QIDQ3541880
Publication date: 27 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11832072_6
Related Items (22)
Improved Analysis of ECHO-256 ⋮ Thinking outside the superbox ⋮ Weak-key distinguishers for AES ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ Upper bound of the length of truncated impossible differentials for AES ⋮ Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers ⋮ Differential Attacks Against SPN: A Thorough Analysis ⋮ Improved key-recovery attacks on reduced-round WEM-8 ⋮ Triangulating rebound attack on AES-like hashing ⋮ Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ Automatic boomerang attacks search on Rijndael ⋮ Internal differential collision attacks on the reduced-round Grøstl-0 hash function ⋮ Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 ⋮ A New Structural-Differential Property of 5-Round AES ⋮ Perfect nonlinear functions and cryptography ⋮ An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher ⋮ Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ New criteria for linear maps in AES-like ciphers ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis
This page was built for publication: Understanding Two-Round Differentials in AES