Improved Single-Key Attacks on 8-Round AES-192 and AES-256

From MaRDI portal
Publication:3058655

DOI10.1007/978-3-642-17373-8_10zbMath1253.94045OpenAlexW2119874003MaRDI QIDQ3058655

Nathan Keller, Orr Dunkelman, Adi Shamir

Publication date: 7 December 2010

Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_10




Related Items (38)

Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksMeet-in-the-middle attacks on 10-round AES-256Extended meet-in-the-middle attacks on some Feistel constructionsPholkos -- efficient large-state tweakable block ciphers from the AES round functionGeneral Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block CipherImproving the Biclique Cryptanalysis of AESKey guessing strategies for linear key-schedule algorithms in rectangle attacksMeet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESCryptanalysis of GOST R hash functionMeet-in-the-middle attacks and structural analysis of round-reduced PRINCEExploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNYMeet-in-the-middle preimage attacks on sponge-based hashingTriangulating rebound attack on AES-like hashingKey structures: improved related-key boomerang attack against the full AES-256Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Optimizing rectangle attacks: a unified and generic framework for key recoveryDifferential meet-in-the-middle cryptanalysisImproved truncated differential distinguishers of AES with concrete S-boxA single-key attack on the full GOST block cipherCryptanalysis of the stream cipher LEXThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherTransposition of AES Key ScheduleAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINEОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESImproved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512A Single-Key Attack on the Full GOST Block CipherMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolKey recovery attacks on reduced-round Joltik-BC in the single-key settingImproved Attacks on Reduced-Round Camellia-128/192/256Revisiting key schedule's diffusion in relation with round function's diffusionImproved Meet-in-the-Middle Distinguisher on Feistel SchemesThe \texttt{Deoxys} AEAD familyA 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANNew representations of the AES key scheduleA novel key scheduling scheme for AES algorithmAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksQuantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES




This page was built for publication: Improved Single-Key Attacks on 8-Round AES-192 and AES-256