Meet-in-the-middle attacks on 10-round AES-256 (Q2630710): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 4 users not shown)
Property / author
 
Property / author: Chen-Hui Jin / rank
Normal rank
 
Property / author
 
Property / author: Chen-Hui Jin / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LEX / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Square / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-015-0113-3 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2190250725 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Cryptanalysis of the Full AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distinguisher and Related-Key Attack on the Full AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Biclique Cryptanalysis of the Full AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Understanding Two-Round Differentials in AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: The block cipher Square / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Meet-in-the-Middle Attack on 8-Round AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Meet-in-the-Middle Attacks on AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Attack on the LEX Stream Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Single-Key Attacks on 8-Round AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537993 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simplified Representation of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Single-Key Attacks on 9-Round AES-192/256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Impossible Differential Attacks on AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Impossible Differential Cryptanalysis of 7-Round AES-128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits / rank
 
Normal rank

Latest revision as of 07:32, 12 July 2024

scientific article
Language Label Description Also known as
English
Meet-in-the-middle attacks on 10-round AES-256
scientific article

    Statements

    Meet-in-the-middle attacks on 10-round AES-256 (English)
    0 references
    0 references
    0 references
    21 July 2016
    0 references
    block cipher
    0 references
    cryptanalysis
    0 references
    meet-in-the-middle attack
    0 references
    AES
    0 references
    0 references
    0 references

    Identifiers