Meet-in-the-middle attacks on AES with value constraints
From MaRDI portal
Publication:6591952
DOI10.1007/s10623-024-01396-9zbMATH Open1545.94061MaRDI QIDQ6591952
Xiaoli Dong, Jie Chen, Yongzhuang Wei, Wen Gao, Jun Liu
Publication date: 23 August 2024
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Mixture integral attacks on reduced-round AES with a known/secret S-box
- The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts
- Yoyo tricks with AES
- Improved Attacks on Reduced-Round Camellia-128/192/256
- Polytopic Cryptanalysis
- New Insights on AES-Like SPN Ciphers
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
- Improved Single-Key Attacks on 9-Round AES-192/256
- Low-Data Complexity Attacks on AES
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Improved Impossible Differential Cryptanalysis of 7-Round AES-128
- Biclique Cryptanalysis of the Full AES
- A Meet-in-the-Middle Attack on 8-Round AES
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved Meet-in-the-Middle Attacks on AES
- The block cipher Square
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Advanced Encryption Standard – AES
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- New Impossible Differential Attacks on AES
- Selected Areas in Cryptography
- A New Structural-Differential Property of 5-Round AES
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
This page was built for publication: Meet-in-the-middle attacks on AES with value constraints