New types of cryptanalytic attacks using related keys

From MaRDI portal
Publication:1340196


DOI10.1007/BF00203965zbMath0812.94012WikidataQ59663184 ScholiaQ59663184MaRDI QIDQ1340196

Eli Biham

Publication date: 30 January 1995

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/bf00203965


94A60: Cryptography

68P25: Data encryption (aspects in computer science)


Related Items

The design of the ICE encryption algorithm, Serpent: A New Block Cipher Proposal, Unnamed Item, Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses, Related-Key Differential-Linear Attacks on Reduced AES-192, A Practical Attack on KeeLoq, New Related-Key Boomerang Attacks on AES, Reflection Cryptanalysis of Some Ciphers, A Differential-Linear Attack on 12-Round Serpent, Side channel cryptanalysis of product ciphers, Простейшие надгруппы регулярных представлений неабелевых $2$-групп с циклической подгруппой индекса $2$, Key structures: improved related-key boomerang attack against the full AES-256, Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128, Practical-time related-key attack on GOST with secret S-boxes, Related-key differential cryptanalysis of GMiMC used in post-quantum signatures, A practical attack on KeeLoq, Tweakable block ciphers, A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony, Practical-time attacks against reduced variants of~MISTY1, A methodology for differential-linear cryptanalysis and its applications, Related-key analysis of generalized Feistel networks with expanding round functions, Improved (related-key) differential cryptanalysis on GIFT, The DBlock family of block ciphers, New slide attacks on almost self-similar ciphers, Provable related-key security of contracting Feistel networks, SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations, Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE, Improved BV-based quantum attack on block ciphers, Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3, New related-key rectangle attacks on reduced AES-192 and AES-256, Efficient slide attacks, Security analysis of SIMECK block cipher against related-key impossible differential, Critique of the related-key attack concept, Reflection cryptanalysis of PRINCE-like ciphers, A quantum related-key attack based on the Bernstein-Vazirani algorithm, Clever Arbiters Versus Malicious Adversaries, Related-Key Attack on Full-Round PICARO, Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64, Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions, Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials, Secure Message Authentication Against Related-Key Attack, How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks, LBlock: A Lightweight Block Cipher, On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model, Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher, Expedient Non-malleability Notions for Hash Functions, Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes, Key distribution. Episode 1: Quantum menace, On Related-Secret Pseudorandomness, SEA: A Scalable Encryption Algorithm for Small Embedded Applications, $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms, Multi-key Security: The Even-Mansour Construction Revisited, A Unified Approach to Related-Key Attacks, Slide Attacks on a Class of Hash Functions, Attacking 9 and 10 Rounds of AES-256, Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT



Cites Work