Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity
From MaRDI portal
Publication:3098004
DOI10.1007/978-3-642-25141-2_12zbMath1344.94072OpenAlexW205924766MaRDI QIDQ3098004
Kazuo Ohta, K. Sakiyama, Yu Sasaki, Naoyuki Takayanagi
Publication date: 10 November 2011
Published in: Advances in Information and Computer Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25141-2_12
Related Items (2)
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
Uses Software
Cites Work
- Unnamed Item
- Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher
- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved Differential Attacks for ECHO and Grøstl
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- How to Break MD5 and Other Hash Functions
- Known-Key Distinguishers for Some Block Ciphers
- Finding Collisions in the Full SHA-1
This page was built for publication: Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity