New insights on AES-like SPN ciphers
From MaRDI portal
Publication:2835602
DOI10.1007/978-3-662-53018-4_22zbMATH Open1384.94102OpenAlexW2479257632MaRDI QIDQ2835602FDOQ2835602
Authors: Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen
Publication date: 30 November 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2665.pdf
Recommendations
- A new structural-differential property of 5-round AES
- Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
- Towards key-dependent integral and impossible differential distinguishers on 5-round AES
- Probabilistic mixture differential cryptanalysis on round-reduced AES
- Yoyo tricks with AES
Cites Work
- AEGIS: a fast authenticated encryption algorithm
- Title not available (Why is that?)
- Title not available (Why is that?)
- Higher Order Derivatives and Differential Cryptanalysis
- Title not available (Why is that?)
- Biclique Cryptanalysis of the Full AES
- Title not available (Why is that?)
- Known-Key Distinguishers for Some Block Ciphers
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Integral and multidimensional linear distinguishers with correlation zero
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Title not available (Why is that?)
- A Meet-in-the-Middle Attack on 8-Round AES
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improved impossible differential cryptanalysis of 7-round AES-128
- The block cipher \textsc{Square}
- New Impossible Differential Attacks on AES
- Structural evaluation by generalized integral property
- Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
- Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
- Links among impossible differential, integral and zero correlation linear cryptanalysis
- The rebound attack and subspace distinguishers: application to Whirlpool
- A simplified representation of AES
- Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
- Integral cryptanalysis on full MISTY1
- Improved meet-in-the-middle attacks on AES
- Improved key recovery attacks on reduced-round AES in the single-key setting
- The Saturation Attack — A Bait for Twofish
- PAEQ: parallelizable permutation-based authenticated encryption
- Title not available (Why is that?)
- Integral cryptanalysis of ARIA
Cited In (19)
- Towards key-dependent integral and impossible differential distinguishers on 5-round AES
- Yoyo tricks with AES
- MixColumns coefficient property and security of the AES with a secret S-Box
- Meet-in-the-middle attacks on AES with value constraints
- New slide attacks on almost self-similar ciphers
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
- The retracing boomerang attack, with application to reduced-round AES
- Upper bound of the length of truncated impossible differentials for AES
- Title not available (Why is that?)
- Proving the Security of AES Substitution-Permutation Network
- New AES Software Speed Records
- Spooky Encryption and Its Applications
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- The retracing boomerang attack
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
- Improved key-recovery attacks on reduced-round WEM-8
- On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers
- A new structural-differential property of 5-round AES
- Mixture integral attacks on reduced-round AES with a known/secret S-box
Uses Software
This page was built for publication: New insights on AES-like SPN ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835602)