Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512

From MaRDI portal
Publication:2806766
Jump to:navigation, search

DOI10.1007/978-3-319-30840-1_8zbMATH Open1384.94022OpenAlexW2463698797MaRDI QIDQ2806766FDOQ2806766


Authors: Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya Edit this on Wikidata


Publication date: 19 May 2016

Published in: Information Security and Cryptology - ICISC 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-30840-1_8




Recommendations

  • Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
  • Side-channeling the \textsf{Kalyna} key expansion
  • Cryptographic properties of a new national encryption standard of Ukraine
  • Improved key recovery attacks on reduced-round AES in the single-key setting
  • Improved single-key attacks on 9-round AES-192/256


zbMATH Keywords

block cipherkey recoveryKalynadifferential enumerationsingle key model


Mathematics Subject Classification ID

Cryptography (94A60)



Cited In (2)

  • Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
  • Side-channeling the \textsf{Kalyna} key expansion





This page was built for publication: Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2806766)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2806766&oldid=15715080"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 3 February 2024, at 17:43. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki