scientific article

From MaRDI portal
Revision as of 22:41, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3046332

zbMath1045.94512MaRDI QIDQ3046332

Eli Biham, Orr Dunkelman, Nathan Keller

Publication date: 12 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2365/23650001.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (24)

New attacks from old distinguishers improved attacks on serpentPholkos -- efficient large-state tweakable block ciphers from the AES round functionKey guessing strategies for linear key-schedule algorithms in rectangle attacksGeneralized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTThe second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristicNew results on quantum boomerang attacksTruncated boomerang attacks and application to AES-based ciphersKey structures: improved related-key boomerang attack against the full AES-256Using double Weil sums in finding the \(c\)-boomerang connectivity table for monomial functions on finite fieldsMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Optimizing rectangle attacks: a unified and generic framework for key recoveryDifferential attack on five rounds of the SC2000 block cipherThe phantom of differential characteristicsA practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephonyInvestigations on \(c\)-boomerang uniformity and perfect nonlinearityA methodology for differential-linear cryptanalysis and its applicationsOn the boomerang uniformity of quadratic permutationsImproved and Multiple Linear Cryptanalysis of Reduced Round SerpentOn the boomerang uniformity of some permutation polynomialsLow \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse functionThe \texttt{Deoxys} AEAD familyImproved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang FrameworkOn Related-Key Attacks and KASUMI: The Case of A5/3A Differential-Linear Attack on 12-Round Serpent


Uses Software



This page was built for publication: