Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
From MaRDI portal
Publication:2845672
DOI10.1007/978-3-642-40041-4_11zbMATH Open1310.94144OpenAlexW1540366790MaRDI QIDQ2845672FDOQ2845672
Authors: Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_11
Recommendations
Cited In (31)
- A method for security estimation of the SPN-based block cipher against related-key attacks
- Computing AES related-key differential characteristics with constraint programming
- The rebound attack and subspace distinguishers: application to Whirlpool
- Revisiting AES related-key differential attacks with constraint programming
- Weak-key distinguishers for AES
- General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher
- And Rijndael? Automatic related-key differential analysis of Rijndael
- Variants of the AES key schedule for better truncated differential bounds
- Faster chosen-key distinguishers on reduced-round AES
- The resistance of PRESENT-80 against related-key differential attacks
- Speeding up the search algorithm for the best differential and best linear trails
- Meet-in-the-middle attacks on 10-round AES-256
- Related-Key Cryptanalysis of Midori
- Diffusion rates of linear medium in AES-like ciphers
- New insights on AES-like SPN ciphers
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- CLAASP: a cryptographic library for the automated analysis of symmetric primitives
- A CP-based automatic tool for instantiating truncated differential characteristics
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- The \texttt{Deoxys} AEAD family
- On the linear and differential cryptanalysis of the AES-like ciphers
- Automatic search of meet-in-the-middle and impossible differential attacks
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Revisiting Gilbert's known-key distinguisher
- Improved top-down techniques in differential cryptanalysis
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Fast chosen-key distinguish attacks on round-reduced AES-192
- A simplified representation of AES
- A new structural-differential property of 5-round AES
- Truncated differential based known-key attacks on round-reduced SIMON
Uses Software
This page was built for publication: Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2845672)