Mixture integral attacks on reduced-round AES with a known/secret S-box
From MaRDI portal
Publication:2152036
DOI10.1007/978-3-030-65277-7_14zbMath1492.94116OpenAlexW2965331623MaRDI QIDQ2152036
Markus Schofnegger, Lorenzo Grassi
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-65277-7_14
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- The retracing boomerang attack
- Mixture integral attacks on reduced-round AES with a known/secret S-box
- The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts
- Mixcolumns properties and attacks on (round-reduced) AES with a single secret S-Box
- Yoyo tricks with AES
- Polytopic Cryptanalysis
- New Insights on AES-Like SPN Ciphers
- Security of the AES with a Secret S-Box
- The block cipher Square
- Automatic Search of Attacks on Round-Reduced AES and Applications
- A New Structural-Differential Property of 5-Round AES
This page was built for publication: Mixture integral attacks on reduced-round AES with a known/secret S-box