More accurate results on the provable security of AES against impossible differential cryptanalysis
From MaRDI portal
Publication:2334448
DOI10.1007/S10623-019-00660-7zbMATH Open1423.94112OpenAlexW2955859497WikidataQ127575521 ScholiaQ127575521MaRDI QIDQ2334448FDOQ2334448
Authors: Qian Wang, Chenhui Jin
Publication date: 7 November 2019
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-019-00660-7
Recommendations
- Upper bound of the length of truncated impossible differentials for AES
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- New Impossible Differential Attacks on AES
- Improved impossible differential cryptanalysis of 7-round AES-128
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
Cites Work
- A construction of a cipher from a single pseudorandom permutation.
- Title not available (Why is that?)
- Title not available (Why is that?)
- The block cipher companion.
- Bounds in shallows and in miseries
- Markov Ciphers and Differential Cryptanalysis
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Impossible differential cryptanalysis using matrix method
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Improved impossible differential cryptanalysis of 7-round AES-128
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part II
- Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Understanding Two-Round Differentials in AES
- Yoyo tricks with AES
- A new structural-differential property of 5-round AES
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Efficient slide attacks
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Note on impossible differential attacks
- A unified method for finding impossible differentials of block cipher structures
- Upper bound of the length of truncated impossible differentials for AES
- Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
- New insights on AES-like SPN ciphers
- Automatic search of truncated impossible differentials for word-oriented block ciphers
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks
- Making the impossible possible
- On the Role of Key Schedules in Attacks on Iterated Ciphers
Cited In (7)
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- Upper bound of the length of truncated impossible differentials for AES
- Finding all impossible differentials when considering the DDT
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Bounding the length of impossible differentials for SPN block ciphers
- Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting
- Impossible differential cryptanalysis on reduced-round PRINCEcore
Uses Software
This page was built for publication: More accurate results on the provable security of AES against impossible differential cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2334448)