New attacks on IDEA with at least 6 rounds
From MaRDI portal
Publication:2344046
DOI10.1007/S00145-013-9162-9zbMath1377.94037OpenAlexW1969343610MaRDI QIDQ2344046
Orr Dunkelman, Eli Biham, Nathan Keller, Adi Shamir
Publication date: 12 May 2015
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-013-9162-9
Related Items (3)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Narrow-Bicliques: Cryptanalysis of Full IDEA
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- A New Attack on 6-Round IDEA
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- The Key-Dependent Attack on Block Ciphers
- Markov Ciphers and Differential Cryptanalysis
- Information Security and Privacy
- Improved DST Cryptanalysis of IDEA
- New Cryptanalytic Results on IDEA
- Fast Software Encryption
- Selected Areas in Cryptography
- Fast Software Encryption
This page was built for publication: New attacks on IDEA with at least 6 rounds