Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1759272 - MaRDI portal

scientific article; zbMATH DE number 1759272

From MaRDI portal
Publication:4537993

zbMath0994.68631MaRDI QIDQ4537993

John Kelsey, Stefan Lucks, Doug Whiting, David Wagner, Bruce Schneier, Niels Ferguson, Mike Stay

Publication date: 25 June 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (58)

A note on an infeasible linearization of some block ciphersSQUARE attack on block ciphers with low algebraic degreeMeet-in-the-middle attacks on 10-round AES-256Amplifying Side-Channel Attacks with Techniques from Block Cipher CryptanalysisMeet-in-the-Middle Technique for Integral Attacks against Feistel CiphersAutomatic search for bit-based division propertyIntegral attacks on Pyjamask-96 and round-reduced Pyjamask-128Image security system using recursive cellular automata substitutionIntegral cryptanalysis on full MISTY1Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesTruncated boomerang attacks and application to AES-based ciphersFinding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacksA quantum related-key attack based on the Bernstein-Vazirani algorithmKey structures: improved related-key boomerang attack against the full AES-256Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption AlgorithmQuantum impossible differential attacks: applications to AES and SKINNYNon-existence of one-byte active impossible differentials for 5-round AES in the master-key settingMathematical aspects of division propertyImproved truncated differential distinguishers of AES with concrete S-boxLinear cryptanalysis of reduced-round SPECKNew differential bounds and division property of Lilliput: block cipher with extended generalized Feistel networkCryptanalysis of the stream cipher LEXA Unified Approach to Related-Key AttacksA Meet-in-the-Middle Attack on 8-Round AESImpossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BCTransposition of AES Key ScheduleA note on quantum related-key attacksImproved Impossible Differential Attacks on Large-Block RijndaelA Five-Round Algebraic Property of the Advanced Encryption StandardNew Results on Impossible Differential Cryptanalysis of Reduced AESKnown-Key Distinguishers for Some Block CiphersPractical-time attacks against reduced variants of~MISTY1Integrals Go Statistical: Cryptanalysis of Full Skipjack VariantsОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESA New Structural-Differential Property of 5-Round AESThe (related-key) impossible boomerang attack and its application to the AES block cipherNew related-key rectangle attacks on reduced AES-192 and AES-256A New Attack on the LEX Stream CipherThe effects of the omission of last round's MixColumns on AESImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesRevisiting key schedule's diffusion in relation with round function's diffusionBreaking LWC candidates: sESTATE and Elephant in quantum settingImproved single-key attacks on 8-round AES-192 and AES-256Tweaking AESThe retracing boomerang attackAttacking 9 and 10 Rounds of AES-256Distinguishers for Ciphers and Known Key Attack against Rijndael with Large BlocksSquare Attack on 7-Round Kiasu-BCA client/server implementation of an encryption system for fingerprint user authenticationA $$2^{70}$$ Attack on the Full MISTY1New Insights on AES-Like SPN CiphersRevisiting Gilbert's known-key distinguisherNew Related-Key Boomerang Attacks on AESNew Impossible Differential Attacks on AESImproved BV-based quantum attack on block ciphersIntegral characteristics by keyspace partitioningQuantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES




This page was built for publication: