Key recovery attacks on recent authenticated ciphers
From MaRDI portal
Publication:2946480
DOI10.1007/978-3-319-16295-9_15zbMATH Open1370.94490OpenAlexW976773762MaRDI QIDQ2946480FDOQ2946480
Authors: Andrey Bogdanov, Christoph Dobraunig, Maria Eichlseder, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser
Publication date: 17 September 2015
Published in: Progress in Cryptology - LATINCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16295-9_15
Recommendations
- Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble
- Key recovery attack against 2.5-round \(\pi\)-Cipher
- Exploiting the leakage: analysis of some authenticated encryption schemes
- Partial key recovery attack against RMAC
- Practical key recovery attacks on FlexAEAD
Cited In (15)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Exploiting the leakage: analysis of some authenticated encryption schemes
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm
- Title not available (Why is that?)
- Plaintext Recovery Attacks Against WPA/TKIP
- Passive–Only Key Recovery Attacks on RC4
- Collision attacks against CAESAR candidates. Forgery and key-recovery against AEZ and Marble
- FASER128: cryptanalysis and its countermeasure
- A direct key recovery attack on SIDH
- An efficient key recovery attack on SIDH
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- Key recovery attack against 2.5-round \(\pi\)-Cipher
This page was built for publication: Key recovery attacks on recent authenticated ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946480)