scientific article
From MaRDI portal
Publication:2778856
zbMath0981.94017MaRDI QIDQ2778856
Nathan Keller, Eli Biham, Orr Dunkelman
Publication date: 21 March 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2045/20450340
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Practical Attack on the Full MMB Block Cipher ⋮ Boomerang Attacks on Hash Function Using Auxiliary Differentials ⋮ A new method for impossible differential cryptanalysis of 8-round advanced encryption standard ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ Impossible differential cryptanalysis of advanced encryption standard ⋮ New attacks from old distinguishers improved attacks on serpent ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Differential-linear cryptanalysis revisited ⋮ Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 ⋮ Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic ⋮ New results on quantum boomerang attacks ⋮ Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Differential Cryptanalysis of Reduced-Round PRESENT ⋮ Generalized boomerang connectivity table and improved cryptanalysis of GIFT ⋮ Differential cryptanalysis of round-reduced \texttt{SPEEDY} family ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Optimizing rectangle attacks: a unified and generic framework for key recovery ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Cryptanalysis of Reduced-Round SMS4 Block Cipher ⋮ A bit-vector differential model for the modular addition by a constant ⋮ Differential attack on five rounds of the SC2000 block cipher ⋮ The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ A Unified Approach to Related-Key Attacks ⋮ New Applications of Differential Bounds of the SDS Structure ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ Finding the differential characteristics of block ciphers with neural networks ⋮ Investigations on \(c\)-boomerang uniformity and perfect nonlinearity ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ On Integral Distinguishers of Rijndael Family of Ciphers ⋮ On the boomerang uniformity of quadratic permutations ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent ⋮ Differential-Multiple Linear Cryptanalysis ⋮ Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ The \texttt{Deoxys} AEAD family ⋮ Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework ⋮ The retracing boomerang attack ⋮ Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ New Related-Key Boomerang Attacks on AES ⋮ A Differential-Linear Attack on 12-Round Serpent