Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY
From MaRDI portal
Publication:6083124
DOI10.1007/978-3-031-30634-1_3zbMath1528.94080OpenAlexW4365807251MaRDI QIDQ6083124
No author found.
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30634-1_3
Cites Work
- The design of Rijndael. The Advanced Encryption Standard (AES)
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Meet-in-the-middle attacks on 10-round AES-256
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
- Improved Single-Key Attacks on 9-Round AES-192/256
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher
- A Meet-in-the-Middle Attack on 8-Round AES
- Improved Meet-in-the-Middle Attacks on AES
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing