Key structures: improved related-key boomerang attack against the full AES-256
From MaRDI portal
Publication:6108767
DOI10.1007/978-3-031-22301-3_1zbMath1527.94044MaRDI QIDQ6108767
Haoyang Wang, Jian Guo, Ling Song
Publication date: 26 July 2023
Published in: Information Security and Privacy (Search for Journal in Brave)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New types of cryptanalytic attacks using related keys
- Boomerang Connectivity Table: a new cryptanalysis tool
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Improved Single-Key Attacks on 9-Round AES-192/256
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Biclique Cryptanalysis of the Full AES
- Distinguisher and Related-Key Attack on the Full AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
- Information Security and Privacy
- Related-Key Boomerang and Rectangle Attacks
- New Impossible Differential Attacks on AES
This page was built for publication: Key structures: improved related-key boomerang attack against the full AES-256