Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others

From MaRDI portal
Publication:3563843


DOI10.1007/978-3-642-13190-5_17zbMath1280.94041MaRDI QIDQ3563843

Ivica Nikolić, Alex Biryukov

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_17


94A60: Cryptography


Related Items

ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES, Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials, And Rijndael? Automatic related-key differential analysis of Rijndael, Automatic boomerang attacks search on Rijndael, The DBlock family of block ciphers, Variants of the AES key schedule for better truncated differential bounds, Revisiting AES related-key differential attacks with constraint programming, The resistance of PRESENT-80 against related-key differential attacks, The \texttt{Deoxys} AEAD family, Pholkos -- efficient large-state tweakable block ciphers from the AES round function, Key guessing strategies for linear key-schedule algorithms in rectangle attacks, Computing AES related-key differential characteristics with constraint programming, The higher-order meet-in-the-middle attack and its application to the Camellia block cipher, Improved Top-Down Techniques in Differential Cryptanalysis, Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES, Transposition of AES Key Schedule, LBlock: A Lightweight Block Cipher, Search for Related-Key Differential Characteristics in DES-Like Ciphers, Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool, Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes, Tweaking AES, Related-Key Cryptanalysis of Midori, Атака на $\mathrm{6}$ раундов Khazad, Показатели рассеивания линейной среды AES-подобных алгоритмов шифрования, О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования, Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails, $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms


Uses Software