A Meet-in-the-Middle Attack on 8-Round AES

From MaRDI portal
Revision as of 00:03, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3525664

DOI10.1007/978-3-540-71039-4_7zbMath1154.68391OpenAlexW1571067952MaRDI QIDQ3525664

Ali Aydın Selçuk, H. Demirci

Publication date: 18 September 2008

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_7




Related Items (43)

Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksMeet-in-the-middle attacks on 10-round AES-256Extended meet-in-the-middle attacks on some Feistel constructionsPholkos -- efficient large-state tweakable block ciphers from the AES round functionGeneral Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block CipherMeet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESQuantum meet-in-the-middle attack on Feistel constructionMeet-in-the-middle attack with splice-and-cut technique and a general automatic frameworkMeet-in-the-middle attacks and structural analysis of round-reduced PRINCEExploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNYMeet-in-the-middle preimage attacks on sponge-based hashingKey structures: improved related-key boomerang attack against the full AES-256Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption AlgorithmQuantum impossible differential attacks: applications to AES and SKINNYDifferential meet-in-the-middle cryptanalysisImproved truncated differential distinguishers of AES with concrete S-boxA single-key attack on the full GOST block cipherThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherSPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsTransposition of AES Key ScheduleImproved Impossible Differential Attacks on Large-Block RijndaelAn improved preimage attack against \texttt{HAVAL-3}ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESImproved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512A Single-Key Attack on the Full GOST Block CipherMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolThe (related-key) impossible boomerang attack and its application to the AES block cipherKey recovery attacks on reduced-round Joltik-BC in the single-key settingImproved Attacks on Reduced-Round Camellia-128/192/256The effects of the omission of last round's MixColumns on AESImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesRevisiting key schedule's diffusion in relation with round function's diffusionImproved single-key attacks on 8-round AES-192 and AES-256Improved Meet-in-the-Middle Distinguisher on Feistel SchemesThe \texttt{Deoxys} AEAD familyTweaking AESA 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANNew representations of the AES key scheduleAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksNew Insights on AES-Like SPN CiphersNew Impossible Differential Attacks on AESQuantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES




Cites Work




This page was built for publication: A Meet-in-the-Middle Attack on 8-Round AES