Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
From MaRDI portal
Publication:2867226
DOI10.1007/978-3-642-42033-7_18zbMath1327.94040OpenAlexW1569217791MaRDI QIDQ2867226
Adi Shamir, Itai Dinur, Orr Dunkelman, Nathan Keller
Publication date: 10 December 2013
Published in: Advances in Cryptology - ASIACRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-42033-7_18
cryptanalysisiterated Even-Mansourkey recovery attacks\(\mathrm{AES}^{2}\) encryption schemeLED encryption scheme
Related Items (13)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ Key recovery attacks on iterated Even-Mansour encryption schemes ⋮ Beyond quadratic speedups in quantum attacks on symmetric schemes ⋮ \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Key alternating ciphers based on involutions ⋮ Minimizing the two-round Even-Mansour cipher ⋮ Slidex attacks on the Even-Mansour encryption scheme ⋮ Reflection cryptanalysis of PRINCE-like ciphers ⋮ The limited deficit method and the problem of constructing orthomorphisms and almost orthomorphisms of abelian groups ⋮ Orthomorphisms of abelian groups with minimum possible pairwise distances ⋮ TNT: how to tweak a block cipher
This page was built for publication: Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2