scientific article; zbMATH DE number 1759272
From MaRDI portal
Publication:4537993
zbMath0994.68631MaRDI QIDQ4537993
John Kelsey, Stefan Lucks, Doug Whiting, David Wagner, Bruce Schneier, Niels Ferguson, Mike Stay
Publication date: 25 June 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (58)
A note on an infeasible linearization of some block ciphers ⋮ SQUARE attack on block ciphers with low algebraic degree ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers ⋮ Automatic search for bit-based division property ⋮ Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 ⋮ Image security system using recursive cellular automata substitution ⋮ Integral cryptanalysis on full MISTY1 ⋮ Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks ⋮ A quantum related-key attack based on the Bernstein-Vazirani algorithm ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm ⋮ Quantum impossible differential attacks: applications to AES and SKINNY ⋮ Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting ⋮ Mathematical aspects of division property ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ Linear cryptanalysis of reduced-round SPECK ⋮ New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network ⋮ Cryptanalysis of the stream cipher LEX ⋮ A Unified Approach to Related-Key Attacks ⋮ A Meet-in-the-Middle Attack on 8-Round AES ⋮ Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC ⋮ Transposition of AES Key Schedule ⋮ A note on quantum related-key attacks ⋮ Improved Impossible Differential Attacks on Large-Block Rijndael ⋮ A Five-Round Algebraic Property of the Advanced Encryption Standard ⋮ New Results on Impossible Differential Cryptanalysis of Reduced AES ⋮ Known-Key Distinguishers for Some Block Ciphers ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ A New Structural-Differential Property of 5-Round AES ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ New related-key rectangle attacks on reduced AES-192 and AES-256 ⋮ A New Attack on the LEX Stream Cipher ⋮ The effects of the omission of last round's MixColumns on AES ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion ⋮ Breaking LWC candidates: sESTATE and Elephant in quantum setting ⋮ Improved single-key attacks on 8-round AES-192 and AES-256 ⋮ Tweaking AES ⋮ The retracing boomerang attack ⋮ Attacking 9 and 10 Rounds of AES-256 ⋮ Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks ⋮ Square Attack on 7-Round Kiasu-BC ⋮ A client/server implementation of an encryption system for fingerprint user authentication ⋮ A $$2^{70}$$ Attack on the Full MISTY1 ⋮ New Insights on AES-Like SPN Ciphers ⋮ Revisiting Gilbert's known-key distinguisher ⋮ New Related-Key Boomerang Attacks on AES ⋮ New Impossible Differential Attacks on AES ⋮ Improved BV-based quantum attack on block ciphers ⋮ Integral characteristics by keyspace partitioning ⋮ Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
This page was built for publication: