Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations

From MaRDI portal
Publication:3577971

DOI10.1007/978-3-642-13858-4_21zbMath1279.94077OpenAlexW1483908684MaRDI QIDQ3577971

Henri Gilbert, Thomas Peyrin

Publication date: 13 July 2010

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13858-4_21




Related Items (52)

Improved Analysis of ECHO-256Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksNimix:An involutary nonlinear vectorial boolean functionWeak-key distinguishers for AESLHash: A Lightweight Hash FunctionCryptanalysis of the Round-Reduced GOST Hash FunctionRelated-Key Cryptanalysis of MidoriPractical Free-Start Collision Attacks on 76-step SHA-1Cryptanalysis of full \texttt{RIPEMD-128}Cryptanalysis of Reduced-Round WhirlwindCryptanalysis of Round-Reduced $$\mathtt{LED}$$Cryptanalysis of GOST R hash functionImproved attacks against reduced-round WhirlwindKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesSuperposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashingTriangulating rebound attack on AES-like hashingSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionQuantum impossible differential attacks: applications to AES and SKINNYAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsCollision attack on \({\mathtt Grindahl}\)Improved truncated differential distinguishers of AES with concrete S-boxOn the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishersQuantum collision attacks on AES-like hashing with low quantum random access memoriesInternal differential collision attacks on the reduced-round Grøstl-0 hash functionCryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modesImproved cryptanalysis of AES-like permutationsStrengthening the Known-Key Security Notion for Block CiphersAnalysis of the Kupyna-256 Hash FunctionОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESAnalysis of Reduced-SHAvite-3-256 v2Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression FunctionMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolKnown-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesImproving the security and efficiency of block ciphers based on LS-designsStatistical integral distinguisher with multi-structure and its application on AES-like ciphersPerfect nonlinear functions and cryptographyConstructing Lightweight Optimal Diffusion Primitives with Feistel StructureDistinguisher on full-round compression function of GOST RThe \texttt{Deoxys} AEAD familyInternal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID TagsSubspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash FunctionImproved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQNew representations of the AES key scheduleWide Trail Design Strategy for Binary MixColumnsExperimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack ComplexityBoomerang Distinguisher for the SIMD-512 Compression FunctionRevisiting Gilbert's known-key distinguisherThe MALICIOUS framework: embedding backdoors into tweakable block ciphersCryptanalysis results on spook. Bringing full-round shadow-512 to the lightThe rebound attack and subspace distinguishers: application to WhirlpoolFinding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound






This page was built for publication: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations