Improved key-recovery attacks on reduced-round WEM-8
From MaRDI portal
Publication:2673988
DOI10.1007/s10623-022-01089-1zbMath1497.94105OpenAlexW4293176352WikidataQ114849678 ScholiaQ114849678MaRDI QIDQ2673988
Jun Liu, Baocang Wang, Jie Chen, Dachao Wang, Yu Pu Hu
Publication date: 22 September 2022
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-022-01089-1
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The design of Rijndael. The Advanced Encryption Standard (AES)
- \textsf{FPL}: white-box secure block cipher using parallel table look-ups
- A construction of a cipher from a single pseudorandom permutation.
- Differential computation analysis: hiding your white-box designs is not enough
- Attacks and countermeasures for white-box designs
- Mixcolumns properties and attacks on (round-reduced) AES with a single secret S-Box
- Yoyo tricks with AES
- Key-recovery attacks on \(\mathsf{ASASA}\)
- New Insights on AES-Like SPN Ciphers
- Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)
- Security of the AES with a Secret S-Box
- Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness
- Efficient and Provable White-Box Primitives
- WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction
- The Saturation Attack — A Bait for Twofish
- A White-Box DES Implementation for DRM Applications
- Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes
- Understanding Two-Round Differentials in AES
- The block cipher Square
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Selected Areas in Cryptography
This page was built for publication: Improved key-recovery attacks on reduced-round WEM-8