Biclique Cryptanalysis of the Full AES
From MaRDI portal
Publication:3102196
DOI10.1007/978-3-642-25385-0_19zbMATH Open1227.94032OpenAlexW1515595447MaRDI QIDQ3102196FDOQ3102196
Authors: Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_19
Recommendations
- Biclique cryptanalysis of full round AES-128 based hashing modes
- Improving the biclique cryptanalysis of AES
- Biclique cryptanalysis on the full Crypton-256 and mCrypton-128
- Biclique cryptanalysis of LBlock and TWINE
- Biclique cryptanalysis of reduced-round Piccolo block cipher
- Bicliques with minimal data and time complexity for AES
- Publication:4945382
- Narrow-bicliques: cryptanalysis of full IDEA
- Distinguisher and Related-Key Attack on the Full AES-256
Cited In (81)
- On the cost of ASIC hardware crackers: a SHA-1 case study
- Distinguisher and Related-Key Attack on the Full AES-256
- Cryptanalysis of the full AES using GPU-like special-purpose hardware
- The rebound attack and subspace distinguishers: application to Whirlpool
- Biclique cryptanalysis of LBlock and TWINE
- A survey on implementation of lightweight block ciphers for resource constraints devices
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Solving hybrid Boolean constraints in continuous space via multilinear Fourier expansions
- A higher order key partitioning attack with application to LBlock
- Biclique cryptanalysis of full round AES-128 based hashing modes
- Security analysis of \textsc{Prince}
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- Towards Understanding the Known-Key Security of Block Ciphers
- New attacks on Feistel structures with improved memory complexities
- Making the impossible possible
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Robust pseudo-random number generators with input secure against side-channel attacks
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Simpira v2: a family of efficient permutations using the AES round function
- Meet-in-the-middle attacks on 10-round AES-256
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Key recovery attacks on iterated Even-Mansour encryption schemes
- The \(t\)-wise independence of substitution-permutation networks
- Biclique attack of block cipher \texttt{SKINNY}
- On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer
- Symmetric cryptoalgorithms in the residue number system
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- New insights on AES-like SPN ciphers
- Rotational rebound attacks on reduced Skein
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- New criterion for diffusion property and applications to improved GFS and EGFN
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks
- NSA and dual EC\(\_\)DRBG: Déjà vu all over again?
- Generalized MitM attacks on full TWINE
- An ID-based signcryption scheme with compartmented secret sharing for unsigncryption
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Using quantum key distribution for cryptographic purposes: a survey
- A novel key scheduling scheme for AES algorithm
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Triangulating rebound attack on AES-like hashing
- Persistent fault analysis with few encryptions
- On a generalization of substitution-permutation networks: the HADES design strategy
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- A note on an infeasible linearization of some block ciphers
- Bad directions in cryptographic hash functions
- Revisiting key schedule's diffusion in relation with round function's diffusion
- The DBlock family of block ciphers
- Format-preserving encryption algorithms using families of tweakable blockciphers
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
- Bicliques with minimal data and time complexity for AES
- Improving the biclique cryptanalysis of AES
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- Bicliques for permutations: collision and preimage attacks in stronger settings
- A framework for automated independent-biclique cryptanalysis
- An Analysis of XSL Applied to BES
- Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
- Non-uniform cracks in the concrete: the power of free precomputation
- Extracts from the SHA-3 competition
- Biclique cryptanalysis on the full Crypton-256 and mCrypton-128
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Differential meet-in-the-middle cryptanalysis
- Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers
- Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm
- Meet-in-the-middle attacks on AES with value constraints
- Automated meet-in-the-middle attack goes to Feistel
- Improved truncated differential distinguishers of AES with concrete S-box
- Advanced Encryption Standard – AES
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Fast software encryption attacks on AES
- Key structures: improved related-key boomerang attack against the full AES-256
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher
- Improved differential meet-in-the-middle cryptanalysis
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
- Generic MitM attack frameworks on sponge constructions
- CryptAttackTester: high-assurance attack analysis
- Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations
- A New Design of Substitution Box with Ideal Strict Avalanche Criterion
This page was built for publication: Biclique Cryptanalysis of the Full AES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3102196)