Efficient slide attacks
From MaRDI portal
Publication:2413611
DOI10.1007/S00145-017-9266-8zbMATH Open1400.94116OpenAlexW2749290289MaRDI QIDQ2413611FDOQ2413611
Authors: Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
Publication date: 14 September 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9266-8
Recommendations
Cites Work
- Analytic combinatorics
- On the Power of Quantum Computation
- A construction of a cipher from a single pseudorandom permutation.
- Title not available (Why is that?)
- Title not available (Why is that?)
- Nondeterministic Algorithms
- Title not available (Why is that?)
- Slidex attacks on the Even-Mansour encryption scheme
- Adavanced slide attacks
- Generic key recovery attack on Feistel scheme
- Title not available (Why is that?)
- Title not available (Why is that?)
- New types of cryptanalytic attacks using related keys
- A practical attack on KeeLoq
- Title not available (Why is that?)
- Improved Attacks on Full GOST
- Reflection Cryptanalysis of Some Ciphers
- Fast Software Encryption
- The block cipher \textsc{Square}
- Structural cryptanalysis of SASAS
- Security analysis of \textsc{Prince}
- Improved Slide Attacks
- Breaking symmetric cryptosystems using quantum period finding
- An improved differential attack on full GOST
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Reflections on slide with a twist attacks
- Slide Attacks on a Class of Hash Functions
- Key-recovery attacks on \(\mathsf {ASASA}\)
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Security of the AES with a secret S-box
- Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation
- A single-key attack on the full GOST block cipher
Cited In (18)
- An STP-based model toward designing S-boxes with good cryptographic properties
- On the resilience of Even-Mansour to invariant permutations
- Practical-time related-key attack on GOST with secret S-boxes
- Title not available (Why is that?)
- A compress slide attack on the full GOST block cipher
- Slide Attacks on a Class of Hash Functions
- New slide attacks on almost self-similar ciphers
- Feistel ciphers based on a single primitive
- The retracing boomerang attack, with application to reduced-round AES
- Title not available (Why is that?)
- Title not available (Why is that?)
- Reflections on slide with a twist attacks
- Improved Slide Attacks
- Related-key differential slide attack against Fountain V1
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Adavanced slide attacks
- Progress in Cryptology – Mycrypt 2005
- Probabilistic slide cryptanalysis and its applications to LED-64 and Zorro
Uses Software
This page was built for publication: Efficient slide attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2413611)