Efficient slide attacks
From MaRDI portal
Publication:2413611
DOI10.1007/S00145-017-9266-8zbMATH Open1400.94116OpenAlexW2749290289MaRDI QIDQ2413611FDOQ2413611
Authors: Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
Publication date: 14 September 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9266-8
Recommendations
Cites Work
- Analytic combinatorics
- On the Power of Quantum Computation
- A construction of a cipher from a single pseudorandom permutation.
- Title not available (Why is that?)
- Title not available (Why is that?)
- Nondeterministic Algorithms
- Title not available (Why is that?)
- Slidex attacks on the Even-Mansour encryption scheme
- Adavanced slide attacks
- Generic Key Recovery Attack on Feistel Scheme
- Title not available (Why is that?)
- Title not available (Why is that?)
- New types of cryptanalytic attacks using related keys
- A practical attack on KeeLoq
- Title not available (Why is that?)
- Improved Attacks on Full GOST
- Reflection Cryptanalysis of Some Ciphers
- Fast Software Encryption
- The block cipher Square
- Structural cryptanalysis of SASAS
- Security Analysis of PRINCE
- Improved Slide Attacks
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- An Improved Differential Attack on Full GOST
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Reflections on slide with a twist attacks
- Slide Attacks on a Class of Hash Functions
- Key-Recovery Attacks on ASASA
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Security of the AES with a Secret S-Box
- Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
- A single-key attack on the full GOST block cipher
Cited In (14)
- An STP-based model toward designing S-boxes with good cryptographic properties
- On the resilience of Even-Mansour to invariant permutations
- Practical-time related-key attack on GOST with secret S-boxes
- Title not available (Why is that?)
- Slide Attacks on a Class of Hash Functions
- New slide attacks on almost self-similar ciphers
- Feistel ciphers based on a single primitive
- The retracing boomerang attack, with application to reduced-round AES
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improved Slide Attacks
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Adavanced slide attacks
- Progress in Cryptology – Mycrypt 2005
Uses Software
This page was built for publication: Efficient slide attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2413611)