Differential meet-in-the-middle cryptanalysis
From MaRDI portal
Publication:6145947
DOI10.1007/978-3-031-38548-3_9OpenAlexW4385654431MaRDI QIDQ6145947
Nicolas David, Patrick Derbez, Christina Boura, María Naya-Plasencia, Gregor Leander
Publication date: 2 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-38548-3_9
Cites Work
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Revisiting AES related-key differential attacks with constraint programming
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Thinking outside the superbox
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Sieve-in-the-Middle: Improved MITM Attacks
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Structural Evaluation by Generalized Integral Property
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Biclique Cryptanalysis of the Full AES
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- The block cipher Square
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- GIFT: A Small Present
- How to Improve Rebound Attacks
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Related-Key Boomerang and Rectangle Attacks
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Key structures: improved related-key boomerang attack against the full AES-256
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Differential meet-in-the-middle cryptanalysis