A Single-Key Attack on the Full GOST Block Cipher (Q3013090): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: KATAN / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: KTANTAN / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Blowfish / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_17 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2206761661 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimage Attacks on One-Block MD4, 63-Step MD5 and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Slide Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26--28, 2007. Revised selected papers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941816 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374941 / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN / rank
 
Normal rank
Property / cites work
 
Property / cites work: KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3722412 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Meet-in-the-Middle Attack on 8-Round AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Meet-in-the-Middle Attacks on AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Single-Key Attacks on 8-Round AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Meet-in-the-Middle Attacks on Reduced-Round DES / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical Attack on KeeLoq / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reflection Cryptanalysis of Some Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Class of Weak Keys for Blowfish / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A (Second) Preimage Attack on the GOST Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the GOST Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10--13, 2008. Revised selected papers / rank
 
Normal rank
Property / cites work
 
Property / cites work: 256 Bit Standardized Crypto for 650 GE – GOST Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Preimages in Full MD5 Faster Than Exhaustive Search / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4499412 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4274294 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2762766 / rank
 
Normal rank

Latest revision as of 06:59, 4 July 2024

scientific article
Language Label Description Also known as
English
A Single-Key Attack on the Full GOST Block Cipher
scientific article

    Statements

    A Single-Key Attack on the Full GOST Block Cipher (English)
    0 references
    0 references
    7 July 2011
    0 references
    block cipher
    0 references
    GOST
    0 references
    single-key attack
    0 references
    reflection attack
    0 references
    meet-in-the-middle attack
    0 references
    equivalent keys
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers