scientific article; zbMATH DE number 1759263
From MaRDI portal
Publication:4537984
zbMath0994.68635MaRDI QIDQ4537984
Tadayoshi Kohno, Bruce Schneier, John Kelsey
Publication date: 13 October 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (39)
Practical Attack on the Full MMB Block Cipher ⋮ Boomerang Attacks on Hash Function Using Auxiliary Differentials ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ New attacks from old distinguishers improved attacks on serpent ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Differential-linear cryptanalysis revisited ⋮ Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic ⋮ New results on quantum boomerang attacks ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Optimizing rectangle attacks: a unified and generic framework for key recovery ⋮ Cryptanalysis of Reduced-Round SMS4 Block Cipher ⋮ Differential attack on five rounds of the SC2000 block cipher ⋮ New Applications of Differential Bounds of the SDS Structure ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ Investigations on \(c\)-boomerang uniformity and perfect nonlinearity ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ Boomerang Attacks on BLAKE-32 ⋮ On Integral Distinguishers of Rijndael Family of Ciphers ⋮ On the boomerang uniformity of quadratic permutations ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent ⋮ Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ On the boomerang uniformity of some permutation polynomials ⋮ Low \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse function ⋮ The \texttt{Deoxys} AEAD family ⋮ Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework ⋮ The retracing boomerang attack ⋮ Mars Attacks! Revisited: ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ Unnamed Item ⋮ Unnamed Item ⋮ New Related-Key Boomerang Attacks on AES ⋮ A Differential-Linear Attack on 12-Round Serpent
This page was built for publication: