Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
From MaRDI portal
Publication:2946895
DOI10.1007/978-3-662-43933-3_28zbMATH Open1321.94053OpenAlexW1409313141MaRDI QIDQ2946895FDOQ2946895
Authors: Patrick Derbez, Pierre-Alain Fouque
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_28
Recommendations
Cites Work
- Title not available (Why is that?)
- Biclique Cryptanalysis of the Full AES
- Distinguisher and Related-Key Attack on the Full AES-256
- Improved single-key attacks on 8-round AES-192 and AES-256
- Title not available (Why is that?)
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- A Meet-in-the-Middle Attack on 8-Round AES
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Improved impossible differential cryptanalysis of 7-round AES-128
- Automatic search of attacks on round-reduced AES and applications
- New Impossible Differential Attacks on AES
- Low-Data Complexity Attacks on AES
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
Cited In (25)
- Automatic search of attacks on round-reduced AES and applications
- Improved meet-in-the-middle attacks on AES
- Linearly equivalent s-boxes and the division property
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher
- Making the impossible possible
- Meet-in-the-middle attacks on AES with value constraints
- A Meet-in-the-Middle Attack on 8-Round AES
- Meet-in-the-middle attacks on 10-round AES-256
- Note on impossible differential attacks
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Automatic search of meet-in-the-middle and impossible differential attacks
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
- New representations of the AES key schedule
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Related-cipher attacks: applications to Ballet and ANT
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging
This page was built for publication: Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946895)