Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
From MaRDI portal
Publication:3563841
DOI10.1007/978-3-642-13190-5_15zbMATH Open1280.94040OpenAlexW1497481941MaRDI QIDQ3563841FDOQ3563841
Authors: Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
Publication date: 1 June 2010
Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_15
Recommendations
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Practical attacks on reduced-round AES
- Meet-in-the-middle attacks on 10-round AES-256
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Attacking 9 and 10 Rounds of AES-256
- Key recovery attacks on recent authenticated ciphers
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Distinguisher and Related-Key Attack on the Full AES-256
- A practical key-recovery attack on 805-round Trivium
Cited In (30)
- Related-key analysis of generalized Feistel networks with expanding round functions
- Distinguisher and Related-Key Attack on the Full AES-256
- Cryptanalysis of the full AES using GPU-like special-purpose hardware
- Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Differential meet-in-the-middle cryptanalysis
- An improved recovery algorithm for decayed AES key schedule images
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes
- Towards Understanding the Known-Key Security of Block Ciphers
- Secure message authentication against related-key attack
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Meet-in-the-middle attacks on 10-round AES-256
- The effects of the omission of last round's MixColumns on AES
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improved single-key attacks on 8-round AES-192 and AES-256
- PSP: parallel sub-pipelined architecture for high throughput AES on FPGA and ASIC
- Related-key security for pseudorandom functions beyond the linear barrier
- New representations of the AES key schedule
- Key structures: improved related-key boomerang attack against the full AES-256
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- Improved single-key attacks on 8-round AES-192 and AES-256
- Improving the biclique cryptanalysis of AES
- New representations of the AES key schedule
- Attacking 9 and 10 Rounds of AES-256
- Practical attacks on reduced-round AES
- Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
This page was built for publication: Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3563841)