Efficient slide attacks
From MaRDI portal
Publication:2413611
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- scientific article; zbMATH DE number 1759655 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1418257 (Why is no real title available?)
- scientific article; zbMATH DE number 3104491 (Why is no real title available?)
- A construction of a cipher from a single pseudorandom permutation.
- A practical attack on KeeLoq
- A single-key attack on the full GOST block cipher
- Adavanced slide attacks
- An improved differential attack on full GOST
- Analytic combinatorics
- Breaking symmetric cryptosystems using quantum period finding
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Fast Software Encryption
- Generic key recovery attack on Feistel scheme
- Improved Attacks on Full GOST
- Improved Slide Attacks
- Key-recovery attacks on \(\mathsf {ASASA}\)
- New types of cryptanalytic attacks using related keys
- Nondeterministic Algorithms
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- On the Power of Quantum Computation
- Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation
- Reflection Cryptanalysis of Some Ciphers
- Reflections on slide with a twist attacks
- Security analysis of \textsc{Prince}
- Security of the AES with a secret S-box
- Slide Attacks on a Class of Hash Functions
- Slidex attacks on the Even-Mansour encryption scheme
- Structural cryptanalysis of SASAS
- The block cipher \textsc{Square}
Cited in
(18)- Slide Attacks on a Class of Hash Functions
- scientific article; zbMATH DE number 1617918 (Why is no real title available?)
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Reflections on slide with a twist attacks
- On the resilience of Even-Mansour to invariant permutations
- An STP-based model toward designing S-boxes with good cryptographic properties
- Related-key differential slide attack against Fountain V1
- Practical-time related-key attack on GOST with secret S-boxes
- Progress in Cryptology – Mycrypt 2005
- A compress slide attack on the full GOST block cipher
- New slide attacks on almost self-similar ciphers
- Feistel ciphers based on a single primitive
- The retracing boomerang attack, with application to reduced-round AES
- scientific article; zbMATH DE number 1759655 (Why is no real title available?)
- Improved Slide Attacks
- Probabilistic slide cryptanalysis and its applications to LED-64 and Zorro
- Adavanced slide attacks
- scientific article; zbMATH DE number 1418257 (Why is no real title available?)
This page was built for publication: Efficient slide attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2413611)