Automatic search of meet-in-the-middle and impossible differential attacks
From MaRDI portal
Publication:2829214
DOI10.1007/978-3-662-53008-5_6zbMATH Open1372.94422OpenAlexW2496427131MaRDI QIDQ2829214FDOQ2829214
Pierre-Alain Fouque, Patrick Derbez
Publication date: 27 October 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_6
Recommendations
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- New automatic search tool for searching for impossible differentials using undisturbed bits
- Automatic search of truncated impossible differentials for word-oriented block ciphers
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Automatic search of attacks on round-reduced AES and applications
Cites Work
- LBlock: A Lightweight Block Cipher
- Piccolo: An Ultra-Lightweight Blockcipher
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Title not available (Why is that?)
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- Title not available (Why is that?)
- Title not available (Why is that?)
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- A Zero-Dimensional Gröbner Basis for AES-128
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
- A Meet-in-the-Middle Attack on 8-Round AES
- Automatic Search of Attacks on Round-Reduced AES and Applications
- Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- Topics in Cryptology – CT-RSA 2006
- Speeding up Collision Search for Byte-Oriented Hash Functions
- Analysis of Differential Attacks in ARX Constructions
- Algebraic Cryptanalysis of 58-Round SHA-1
- Information Security and Cryptology - ICISC 2003
- Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers
- Title not available (Why is that?)
- General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
- Cryptanalysis of FIDES
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- New attacks on IDEA with at least 6 rounds
Cited In (21)
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Automated key recovery attacks on round-reduced Orthros
- New automatic search tool for searching for impossible differentials using undisturbed bits
- New algorithm for exhausting optimal permutations for generalized Feistel networks
- Automated meet-in-the-middle attack goes to Feistel
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Improved attacks against reduced-round Whirlwind
- Simplified MITM modeling for permutations: new (quantum) attacks
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
- Generic MitM attack frameworks on sponge constructions
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Uses Software
This page was built for publication: Automatic search of meet-in-the-middle and impossible differential attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829214)