Improved Single-Key Attacks on 8-Round AES-192 and AES-256

From MaRDI portal
Publication:3058655


DOI10.1007/978-3-642-17373-8_10zbMath1253.94045MaRDI QIDQ3058655

Nathan Keller, Orr Dunkelman, Adi Shamir

Publication date: 7 December 2010

Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_10


94A60: Cryptography


Related Items

Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE, ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES, Triangulating rebound attack on AES-like hashing, Key structures: improved related-key boomerang attack against the full AES-256, Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}, Optimizing rectangle attacks: a unified and generic framework for key recovery, Improved truncated differential distinguishers of AES with concrete S-box, Cryptanalysis of GOST R hash function, Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512, A single-key attack on the full GOST block cipher, Cryptanalysis of the stream cipher LEX, The \texttt{Deoxys} AEAD family, New representations of the AES key schedule, Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES, Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks, Pholkos -- efficient large-state tweakable block ciphers from the AES round function, Key guessing strategies for linear key-schedule algorithms in rectangle attacks, Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE, Key recovery attacks on reduced-round Joltik-BC in the single-key setting, The higher-order meet-in-the-middle attack and its application to the Camellia block cipher, Revisiting key schedule's diffusion in relation with round function's diffusion, Meet-in-the-middle attacks on 10-round AES-256, Extended meet-in-the-middle attacks on some Feistel constructions, Improved Attacks on Reduced-Round Camellia-128/192/256, Improved Meet-in-the-Middle Distinguisher on Feistel Schemes, A novel key scheduling scheme for AES algorithm, Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks, Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3, Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES, Transposition of AES Key Schedule, A Single-Key Attack on the Full GOST Block Cipher, Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool, A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN, General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher, Improving the Biclique Cryptanalysis of AES