A Unified Approach to Related-Key Attacks
From MaRDI portal
Publication:3525662
DOI10.1007/978-3-540-71039-4_5zbMath1154.68382OpenAlexW1587158155MaRDI QIDQ3525662
Orr Dunkelman, Nathan Keller, Eli Biham
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_5
Related Items (6)
Cryptanalysis of WIDEA ⋮ How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ Three third generation attacks on the format preserving encryption scheme FF3 ⋮ Reflection Cryptanalysis of Some Ciphers
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cycle lengths in a permutation are typically Poisson
- New types of cryptanalytic attacks using related keys
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- A New Attack on 6-Round IDEA
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Markov Ciphers and Differential Cryptanalysis
- The block cipher Square
- Information Security and Privacy
- Information Security and Privacy
- Related-Key Boomerang and Rectangle Attacks
- Improved Time-Memory Trade-Offs with Multiple Data
- Improved DST Cryptanalysis of IDEA
- New Cryptanalytic Results on IDEA
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
- Fast Software Encryption
- Selected Areas in Cryptography
- Selected Areas in Cryptography
- Fast Software Encryption
This page was built for publication: A Unified Approach to Related-Key Attacks