Pages that link to "Item:Q3582766"
From MaRDI portal
The following pages link to A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony (Q3582766):
Displayed 17 items.
- Practical-time attacks against reduced variants of~MISTY1 (Q494594) (← links)
- Improved (related-key) differential cryptanalysis on GIFT (Q832340) (← links)
- PRINCEv2. More security for (almost) no overhead (Q832374) (← links)
- On the boomerang uniformity of quadratic permutations (Q2004976) (← links)
- Improved BV-based quantum attack on block ciphers (Q2110996) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- Investigations on \(c\)-boomerang uniformity and perfect nonlinearity (Q2231773) (← links)
- A quantum related-key attack based on the Bernstein-Vazirani algorithm (Q2681588) (← links)
- Hash Functions from Defective Ideal Ciphers (Q2790047) (← links)
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo (Q2874334) (← links)
- Practical Attack on the Full MMB Block Cipher (Q2889870) (← links)
- LBlock: A Lightweight Block Cipher (Q3011308) (← links)
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model (Q3013081) (← links)
- On Related-Key Attacks and KASUMI: The Case of A5/3 (Q3104731) (← links)
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT (Q6134020) (← links)
- Optimizing rectangle attacks: a unified and generic framework for key recovery (Q6135405) (← links)