Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512
From MaRDI portal
Publication:2806766
DOI10.1007/978-3-319-30840-1_8zbMATH Open1384.94022OpenAlexW2463698797MaRDI QIDQ2806766FDOQ2806766
Authors: Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
Publication date: 19 May 2016
Published in: Information Security and Cryptology - ICISC 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-30840-1_8
Recommendations
- Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
- Side-channeling the \textsf{Kalyna} key expansion
- Cryptographic properties of a new national encryption standard of Ukraine
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Improved single-key attacks on 9-round AES-192/256
Cited In (2)
This page was built for publication: Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2806766)