Efficient slide attacks
From MaRDI portal
Publication:2413611
DOI10.1007/s00145-017-9266-8zbMath1400.94116OpenAlexW2749290289MaRDI QIDQ2413611
Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eli Biham
Publication date: 14 September 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9266-8
Related Items (5)
On the resilience of Even-Mansour to invariant permutations ⋮ An STP-based model toward designing S-boxes with good cryptographic properties ⋮ Practical-time related-key attack on GOST with secret S-boxes ⋮ New slide attacks on almost self-similar ciphers ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A practical attack on KeeLoq
- Structural cryptanalysis of SASAS
- Reflections on slide with a twist attacks
- New types of cryptanalytic attacks using related keys
- A construction of a cipher from a single pseudorandom permutation.
- A single-key attack on the full GOST block cipher
- Slidex attacks on the Even-Mansour encryption scheme
- Key-Recovery Attacks on ASASA
- Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
- An Improved Differential Attack on Full GOST
- Breaking Symmetric Cryptosystems Using Quantum Period Finding
- Generic Key Recovery Attack on Feistel Scheme
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Security Analysis of PRINCE
- Security of the AES with a Secret S-Box
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Improved Slide Attacks
- Slide Attacks on a Class of Hash Functions
- On the Power of Quantum Computation
- The block cipher Square
- Improved Attacks on Full GOST
- Reflection Cryptanalysis of Some Ciphers
- Nondeterministic Algorithms
- Fast Software Encryption
This page was built for publication: Efficient slide attacks