More accurate results on the provable security of AES against impossible differential cryptanalysis
From MaRDI portal
Publication:2334448
Recommendations
- Upper bound of the length of truncated impossible differentials for AES
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- New Impossible Differential Attacks on AES
- Improved impossible differential cryptanalysis of 7-round AES-128
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 5296403 (Why is no real title available?)
- A construction of a cipher from a single pseudorandom permutation.
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- A new structural-differential property of 5-round AES
- A unified method for finding impossible differentials of block cipher structures
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part II
- Automatic search of truncated impossible differentials for word-oriented block ciphers
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Bounds in shallows and in miseries
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Efficient slide attacks
- Impossible differential cryptanalysis using matrix method
- Improved impossible differential cryptanalysis of 7-round AES-128
- Making the impossible possible
- Markov Ciphers and Differential Cryptanalysis
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- New insights on AES-like SPN ciphers
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Note on impossible differential attacks
- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
- Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon
- The block cipher companion.
- Understanding Two-Round Differentials in AES
- Upper bound of the length of truncated impossible differentials for AES
- Yoyo tricks with AES
Cited in
(7)- Finding all impossible differentials when considering the DDT
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Bounding the length of impossible differentials for SPN block ciphers
- Upper bound of the length of truncated impossible differentials for AES
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting
- Impossible differential cryptanalysis on reduced-round PRINCEcore
This page was built for publication: More accurate results on the provable security of AES against impossible differential cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2334448)