scientific article; zbMATH DE number 1759263

From MaRDI portal
Publication:4537984

zbMath0994.68635MaRDI QIDQ4537984

Tadayoshi Kohno, Bruce Schneier, John Kelsey

Publication date: 13 October 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (39)

Practical Attack on the Full MMB Block CipherBoomerang Attacks on Hash Function Using Auxiliary DifferentialsImproved (related-key) differential cryptanalysis on GIFTAmplifying Side-Channel Attacks with Techniques from Block Cipher CryptanalysisBoomerang Attack on Step-Reduced SHA-512New attacks from old distinguishers improved attacks on serpentKey guessing strategies for linear key-schedule algorithms in rectangle attacksDifferential-linear cryptanalysis revisitedImproved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTThe second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristicNew results on quantum boomerang attacksKey structures: improved related-key boomerang attack against the full AES-256Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Optimizing rectangle attacks: a unified and generic framework for key recoveryCryptanalysis of Reduced-Round SMS4 Block CipherDifferential attack on five rounds of the SC2000 block cipherNew Applications of Differential Bounds of the SDS StructureCryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006Investigations on \(c\)-boomerang uniformity and perfect nonlinearityA methodology for differential-linear cryptanalysis and its applicationsBoomerang Attacks on BLAKE-32On Integral Distinguishers of Rijndael Family of CiphersOn the boomerang uniformity of quadratic permutationsThe (related-key) impossible boomerang attack and its application to the AES block cipherImproved and Multiple Linear Cryptanalysis of Reduced Round SerpentAnalysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSAImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesOn the boomerang uniformity of some permutation polynomialsLow \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse functionThe \texttt{Deoxys} AEAD familyImproved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang FrameworkThe retracing boomerang attackMars Attacks! Revisited:On Related-Key Attacks and KASUMI: The Case of A5/3Unnamed ItemUnnamed ItemNew Related-Key Boomerang Attacks on AESA Differential-Linear Attack on 12-Round Serpent




This page was built for publication: