Improving the Biclique Cryptanalysis of AES
From MaRDI portal
Publication:3194588
DOI10.1007/978-3-319-19962-7_3zbMath1356.94085OpenAlexW972261331WikidataQ61645749 ScholiaQ61645749MaRDI QIDQ3194588
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_3
Related Items (3)
Generalized MitM attacks on full TWINE ⋮ A quantum related-key attack based on the Bernstein-Vazirani algorithm ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool
Uses Software
Cites Work
- Sieve-in-the-Middle: Improved MITM Attacks
- Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher
- Narrow-Bicliques: Cryptanalysis of Full IDEA
- Bicliques with Minimal Data and Time Complexity for AES
- A Framework for Automated Independent-Biclique Cryptanalysis
- Improved Single-Key Attacks on 9-Round AES-192/256
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Improved Impossible Differential Cryptanalysis of 7-Round AES-128
- Biclique Cryptanalysis of the Full AES
- Biclique Attack on the Full HIGHT
- Distinguisher and Related-Key Attack on the Full AES-256
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- New Related-Key Boomerang Attacks on AES
- Selected Areas in Cryptography
- Topics in Cryptology – CT-RSA 2006
- Unnamed Item
This page was built for publication: Improving the Biclique Cryptanalysis of AES