Optimizing rectangle attacks: a unified and generic framework for key recovery
From MaRDI portal
Publication:6135405
DOI10.1007/978-3-031-22963-3_14zbMath1519.94187OpenAlexW4317928186MaRDI QIDQ6135405
Nana Zhang, Jiahao Zhao, Lei Hu, Qianqian Yang, Danping Shi, Jian Weng, Ling Song
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22963-3_14
boomerang attackserpent\texttt{SKINNY}rectangle attack\texttt{Deoxys-BC}\texttt{CRAFT}key recovery algorithm
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Differential cryptanalysis of DES-like cryptosystems
- Boomerang Connectivity Table: a new cryptanalysis tool
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- On probability of success in linear and differential cryptanalysis
- Improved single-key attacks on 8-round AES-192 and AES-256
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Observations on the SIMON Block Cipher Family
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- The Return of the Cryptographic Boomerang
- Generic framework for key-guessing improvements
This page was built for publication: Optimizing rectangle attacks: a unified and generic framework for key recovery