Making the impossible possible
From MaRDI portal
Recommendations
- Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon
- The state-of-the-art of research on impossible differential cryptanalysis
- New Impossible Differential Attacks on AES
- On computational complexity of impossible differential cryptanalysis
- Impossible differential cryptanalysis of advanced encryption standard
Cites work
- scientific article; zbMATH DE number 1759266 (Why is no real title available?)
- scientific article; zbMATH DE number 1418242 (Why is no real title available?)
- Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method
- Biclique Cryptanalysis of the Full AES
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Differential analysis and meet-in-the-middle attack against round-reduced TWINE
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Impossible Differential Cryptanalysis of CLEFIA
- Impossible differential attack on 13-round Camellia-192
- Impossible differential attacks on 13-round CLEFIA-128
- Improved impossible differential cryptanalysis of 7-round AES-128
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Improving impossible-differential attacks against Rijndael-160 and Rijndael-224
- Information Security and Cryptology - ICISC 2003
- Information Security and Cryptology - ICISC 2003
- LBlock: a lightweight block cipher
- Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia
- Multiple limited-birthday distinguishers and applications
- New Impossible Differential Attacks on AES
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- New observations on impossible differential cryptanalysis of reduced-round Camellia
- Note on impossible differential attacks
- On computational complexity of impossible differential cryptanalysis
- PRESENT: An Ultra-Lightweight Block Cipher
- Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- The LED block cipher
Cited in
(29)- New insights on impossible differential cryptanalysis
- scientific article; zbMATH DE number 1504538 (Why is no real title available?)
- Note on impossible differential attacks
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- Making things happen
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- New representations of the AES key schedule
- The state-of-the-art of research on impossible differential cryptanalysis
- Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}
- On the primitivity of the AES-128 key-schedule
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- On computational complexity of impossible differential cryptanalysis
- Improbable differential from impossible differential: on the validity of the model
- Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon
- Truncated boomerang attacks and application to AES-based ciphers
- New representations of the AES key schedule
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Bounding the length of impossible differentials for SPN block ciphers
- Impossible differential cryptanalysis of 16/18-round Khudra
- On impossible truncated differentials of XSL ciphers
- Improved truncated differential distinguishers of AES with concrete S-box
- Quantum impossible differential attacks: applications to AES and SKINNY
- Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting
- scientific article; zbMATH DE number 5320328 (Why is no real title available?)
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- Impossible differential cryptanalysis of the raindrop block cipher
- Impossible differential cryptanalysis of ARIA reduced to 7 rounds
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
This page was built for publication: Making the impossible possible
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1747659)