Distinguisher and Related-Key Attack on the Full AES-256

From MaRDI portal
Publication:3183567

DOI10.1007/978-3-642-03356-8_14zbMath1252.94051OpenAlexW1554865288WikidataQ56038130 ScholiaQ56038130MaRDI QIDQ3183567

Ivica Nikolić, Dmitry Khovratovich, Alex Biryukov

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_14




Related Items (54)

Weak-key distinguishers for AESMeet-in-the-middle attacks on 10-round AES-256Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-MansourMulti-key Security: The Even-Mansour Construction RevisitedAn Algebraic Framework for Pseudorandom Functions and Applications to Related-Key SecurityImproving the Biclique Cryptanalysis of AESAn analysis of the blockcipher-based hash functions from PGVFast garbling of circuits under standard assumptionsComplementing Feistel CiphersCryptanalysis of Round-Reduced $$\mathtt{LED}$$Secure Message Authentication Against Related-Key AttackTowards Understanding the Known-Key Security of Block CiphersExhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESOpen problems in hash function securityThe DBlock family of block ciphersImpossibility of indifferentiable iterated blockciphers from 3 or less primitive callsKey structures: improved related-key boomerang attack against the full AES-256On the related-key attack security of authenticated encryption schemesRevisiting related-key boomerang attacks on AES using computer-aided toolWhen messages are keys: is HMAC a dual-PRF?Transposition of AES Key ScheduleHow to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key AttacksVariants of the AES key schedule for better truncated differential boundsRotational cryptanalysis on MAC algorithm chaskeyAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINELBlock: A Lightweight Block CipherOn Cipher-Dependent Related-Key Attacks in the Ideal-Cipher ModelMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolKnown-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesStatistical integral distinguisher with multi-structure and its application on AES-like ciphersOn Integral Distinguishers of Rijndael Family of CiphersRelated-key security for pseudorandom functions beyond the linear barrierThe (related-key) impossible boomerang attack and its application to the AES block cipherThe resistance of PRESENT-80 against related-key differential attacksHash Functions from Defective Ideal CiphersComputing AES related-key differential characteristics with constraint programmingImproved single-key attacks on 8-round AES-192 and AES-256Revisiting AES related-key differential attacks with constraint programmingThe \texttt{Deoxys} AEAD familyRotational rebound attacks on reduced SkeinTweaking AESSubspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash FunctionCryptanalysis of Luffa v2 ComponentsNew representations of the AES key scheduleProvable related-key security of contracting Feistel networksBoomerang Distinguisher for the SIMD-512 Compression FunctionOn Related-Secret PseudorandomnessA Domain Extender for the Ideal CipherRevisiting Gilbert's known-key distinguisherUnnamed ItemDon't tamper with dual system encryption. Beyond polynomial related-key security of IBEThe rebound attack and subspace distinguishers: application to WhirlpoolImproved see-in-the-middle attacks on AESQuantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions




This page was built for publication: Distinguisher and Related-Key Attack on the Full AES-256