scientific article
From MaRDI portal
Publication:3046332
zbMath1045.94512MaRDI QIDQ3046332
Eli Biham, Orr Dunkelman, Nathan Keller
Publication date: 12 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2365/23650001.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68N99)
Related Items (24)
New attacks from old distinguishers improved attacks on serpent ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic ⋮ New results on quantum boomerang attacks ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Using double Weil sums in finding the \(c\)-boomerang connectivity table for monomial functions on finite fields ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Optimizing rectangle attacks: a unified and generic framework for key recovery ⋮ Differential attack on five rounds of the SC2000 block cipher ⋮ The phantom of differential characteristics ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ Investigations on \(c\)-boomerang uniformity and perfect nonlinearity ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ On the boomerang uniformity of quadratic permutations ⋮ Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent ⋮ On the boomerang uniformity of some permutation polynomials ⋮ Low \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse function ⋮ The \texttt{Deoxys} AEAD family ⋮ Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ A Differential-Linear Attack on 12-Round Serpent
Uses Software
This page was built for publication: