Side-channeling the \textsf{Kalyna} key expansion
From MaRDI portal
Publication:2152165
DOI10.1007/978-3-030-95312-6_12zbMATH Open1492.94081OpenAlexW4210729252MaRDI QIDQ2152165FDOQ2152165
Authors: Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom, Zhiyuan Zhang
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_12
Recommendations
- Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512
- Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
- Cryptographic properties of a new national encryption standard of Ukraine
- Topics in Cryptology – CT-RSA 2006
- Simple power analysis on AES key expansion revisited
Cites Work
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Power Analysis Attacks
- Topics in Cryptology – CT-RSA 2006
- Title not available (Why is that?)
- Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
- Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512
- Cryptanalysis of Kalyna block cipher using impossible differential technique
- RSA key recovery from digit equivalence information
- Sliding Right into Disaster: Left-to-Right Sliding Windows Leak
- Faster side-channel resistant elliptic curve scalar multiplication
- О новом российском стандарте шифрования
- Predicting Secret Keys Via Branch Prediction
Cited In (1)
Uses Software
This page was built for publication: Side-channeling the \textsf{Kalyna} key expansion
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152165)