Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others

From MaRDI portal
Publication:3563843

DOI10.1007/978-3-642-13190-5_17zbMath1280.94041OpenAlexW2095934050MaRDI QIDQ3563843

Ivica Nikolić, Alex Biryukov

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_17




Related Items (27)

Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple PlatformsRelated-Key Cryptanalysis of MidoriPholkos -- efficient large-state tweakable block ciphers from the AES round functionKey guessing strategies for linear key-schedule algorithms in rectangle attacksImproved Top-Down Techniques in Differential CryptanalysisExhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESThe DBlock family of block ciphersAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsAnd Rijndael? Automatic related-key differential analysis of RijndaelAutomatic boomerang attacks search on RijndaelThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherTransposition of AES Key ScheduleVariants of the AES key schedule for better truncated differential boundsОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESLBlock: A Lightweight Block CipherSearch for Related-Key Differential Characteristics in DES-Like CiphersMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolKnown-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesThe resistance of PRESENT-80 against related-key differential attacksComputing AES related-key differential characteristics with constraint programmingRevisiting AES related-key differential attacks with constraint programmingThe \texttt{Deoxys} AEAD familyАтака на $\mathrm{6}$ раундов KhazadПоказатели рассеивания линейной среды AES-подобных алгоритмов шифрованияО линейном и разностном криптоанализе AES-подобных алгоритмов шифрованияTweaking AES


Uses Software



This page was built for publication: Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others