Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others - MaRDI portal

Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others

From MaRDI portal
Publication:3563843

DOI10.1007/978-3-642-13190-5_17zbMath1280.94041OpenAlexW2095934050MaRDI QIDQ3563843

Ivica Nikolić, Alex Biryukov

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_17




Related Items (27)

Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple PlatformsRelated-Key Cryptanalysis of MidoriPholkos -- efficient large-state tweakable block ciphers from the AES round functionKey guessing strategies for linear key-schedule algorithms in rectangle attacksImproved Top-Down Techniques in Differential CryptanalysisExhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESThe DBlock family of block ciphersAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsAnd Rijndael? Automatic related-key differential analysis of RijndaelAutomatic boomerang attacks search on RijndaelThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherTransposition of AES Key ScheduleVariants of the AES key schedule for better truncated differential boundsОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESLBlock: A Lightweight Block CipherSearch for Related-Key Differential Characteristics in DES-Like CiphersMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolKnown-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesThe resistance of PRESENT-80 against related-key differential attacksComputing AES related-key differential characteristics with constraint programmingRevisiting AES related-key differential attacks with constraint programmingThe \texttt{Deoxys} AEAD familyАтака на $\mathrm{6}$ раундов KhazadПоказатели рассеивания линейной среды AES-подобных алгоритмов шифрованияО линейном и разностном криптоанализе AES-подобных алгоритмов шифрованияTweaking AES


Uses Software



This page was built for publication: Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others