A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
From MaRDI portal
Publication:6636390
DOI10.1007/978-3-031-58716-0_8MaRDI QIDQ6636390
María Naya-Plasencia, Rachelle Heim Boissier, N. David, Christina Boura, Patrick Derbez
Publication date: 12 November 2024
differential cryptanalysiskey recoveryautomatic tool\texttt{GIFT}\texttt{PRESENT}\texttt{SPEEDY}\texttt{RECTANGLE}
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Decorrelation: a theory for block cipher security
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Differential Factors Revisited: Corrected Attacks on PRESENT and SERPENT
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- Sieve-in-the-Middle: Improved MITM Attacks
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Differential Cryptanalysis of Reduced-Round PRESENT
- PRESENT: An Ultra-Lightweight Block Cipher
- Differential Cryptanalysis of Feal and N-Hash
- The Wide Trail Design Strategy
- GIFT: A Small Present
- Automatic Search of Attacks on Round-Reduced AES and Applications
- How to Improve Rebound Attacks
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Improved differential-linear attacks with applications to ARX ciphers
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- Generic framework for key-guessing improvements
- And Rijndael? Automatic related-key differential analysis of Rijndael
- Differential cryptanalysis in the fixed-key model
- Optimising linear key recovery attacks with affine Walsh transform pruning
This page was built for publication: A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6636390)