Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
From MaRDI portal
Publication:3563841
DOI10.1007/978-3-642-13190-5_15zbMath1280.94040OpenAlexW1497481941MaRDI QIDQ3563841
Dmitry Khovratovich, Adi Shamir, Alex Biryukov, Nathan Keller, Orr Dunkelman
Publication date: 1 June 2010
Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_15
Related Items (18)
Related-key analysis of generalized Feistel networks with expanding round functions ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ Improving the Biclique Cryptanalysis of AES ⋮ Secure Message Authentication Against Related-Key Attack ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool ⋮ Differential meet-in-the-middle cryptanalysis ⋮ PSP: parallel sub-pipelined architecture for high throughput AES on FPGA and ASIC ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace ⋮ Improved single-key attacks on 8-round AES-192 and AES-256 ⋮ New representations of the AES key schedule
This page was built for publication: Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds