A Single-Key Attack on the Full GOST Block Cipher
From MaRDI portal
Publication:3013090
DOI10.1007/978-3-642-21702-9_17zbMath1307.94059OpenAlexW2206761661WikidataQ56287837 ScholiaQ56287837MaRDI QIDQ3013090
Publication date: 7 July 2011
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_17
Related Items (21)
All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ Bicliques with Minimal Data and Time Complexity for AES ⋮ Quantum attacks on some Feistel block ciphers ⋮ Reflections on slide with a twist attacks ⋮ On the related-key attack security of authenticated encryption schemes ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ A compress slide attack on the full GOST block cipher ⋮ Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 ⋮ Пригодная для низкоресурсной реализации модификация блочного шифра ГОСТ ⋮ Атака на ГОСТ с уменьшенным числом итераций методом согласования ⋮ Об эксплуатационных качествах одного перспективного блочного шифра типа LSX ⋮ О новом российском стандарте шифрования ⋮ Анализ шифра Кузнечик методом искажений ⋮ CRYPTANALYSIS OF GOST IN THE MULTIPLE-KEY SCENARIO ⋮ ROTATIONAL CRYPTANALYSIS OF GOST WITH IDENTICAL S-BOXES ⋮ Efficient dissection of bicomposite problems with cryptanalytic applications ⋮ An Improved Differential Attack on Full GOST ⋮ Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами ⋮ Reflection cryptanalysis of PRINCE-like ciphers ⋮ Об использовании подобия подстановок при определении ключа в сетях Фейстеля
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10--13, 2008. Revised selected papers
- Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26--28, 2007. Revised selected papers
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Improved Slide Attacks
- A New Class of Weak Keys for Blowfish
- PRESENT: An Ultra-Lightweight Block Cipher
- A Meet-in-the-Middle Attack on 8-Round AES
- A (Second) Preimage Attack on the GOST Hash Function
- 256 Bit Standardized Crypto for 650 GE – GOST Revisited
- Cryptanalysis of the GOST Hash Function
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Improved Meet-in-the-Middle Attacks on AES
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- A Practical Attack on KeeLoq
- Reflection Cryptanalysis of Some Ciphers
- Fast Software Encryption
This page was built for publication: A Single-Key Attack on the Full GOST Block Cipher