Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
From MaRDI portal
Publication:3563843
DOI10.1007/978-3-642-13190-5_17zbMath1280.94041OpenAlexW2095934050MaRDI QIDQ3563843
Publication date: 1 June 2010
Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_17
related-key attackAESCamelliaopen keycryptanalysis toolKhazadAnubisFOXsearch for best differential characteristics
Related Items (27)
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails ⋮ $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms ⋮ Related-Key Cryptanalysis of Midori ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Improved Top-Down Techniques in Differential Cryptanalysis ⋮ Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES ⋮ The DBlock family of block ciphers ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ And Rijndael? Automatic related-key differential analysis of Rijndael ⋮ Automatic boomerang attacks search on Rijndael ⋮ The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ Transposition of AES Key Schedule ⋮ Variants of the AES key schedule for better truncated differential bounds ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ LBlock: A Lightweight Block Cipher ⋮ Search for Related-Key Differential Characteristics in DES-Like Ciphers ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes ⋮ The resistance of PRESENT-80 against related-key differential attacks ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ Revisiting AES related-key differential attacks with constraint programming ⋮ The \texttt{Deoxys} AEAD family ⋮ Атака на $\mathrm{6}$ раундов Khazad ⋮ Показатели рассеивания линейной среды AES-подобных алгоритмов шифрования ⋮ О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования ⋮ Tweaking AES
Uses Software
This page was built for publication: Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others