Meet-in-the-middle attacks on 10-round AES-256
From MaRDI portal
Publication:2630710
DOI10.1007/s10623-015-0113-3zbMath1402.94062OpenAlexW2190250725MaRDI QIDQ2630710
Publication date: 21 July 2016
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-015-0113-3
Related Items (5)
Quantum circuit implementation and resource analysis of LBlock and LiCi ⋮ Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ Transposition of AES Key Schedule ⋮ Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- A Simplified Representation of AES
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
- Improved Single-Key Attacks on 9-Round AES-192/256
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Improved Impossible Differential Cryptanalysis of 7-Round AES-128
- Biclique Cryptanalysis of the Full AES
- Distinguisher and Related-Key Attack on the Full AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Understanding Two-Round Differentials in AES
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- A New Attack on the LEX Stream Cipher
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Improved Meet-in-the-Middle Attacks on AES
- The block cipher Square
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- New Impossible Differential Attacks on AES
This page was built for publication: Meet-in-the-middle attacks on 10-round AES-256