Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
From MaRDI portal
Publication:3577971
DOI10.1007/978-3-642-13858-4_21zbMath1279.94077OpenAlexW1483908684MaRDI QIDQ3577971
Publication date: 13 July 2010
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13858-4_21
Related Items (52)
Improved Analysis of ECHO-256 ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Nimix:An involutary nonlinear vectorial boolean function ⋮ Weak-key distinguishers for AES ⋮ LHash: A Lightweight Hash Function ⋮ Cryptanalysis of the Round-Reduced GOST Hash Function ⋮ Related-Key Cryptanalysis of Midori ⋮ Practical Free-Start Collision Attacks on 76-step SHA-1 ⋮ Cryptanalysis of full \texttt{RIPEMD-128} ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ ⋮ Cryptanalysis of GOST R hash function ⋮ Improved attacks against reduced-round Whirlwind ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Triangulating rebound attack on AES-like hashing ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Quantum impossible differential attacks: applications to AES and SKINNY ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Collision attack on \({\mathtt Grindahl}\) ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers ⋮ Quantum collision attacks on AES-like hashing with low quantum random access memories ⋮ Internal differential collision attacks on the reduced-round Grøstl-0 hash function ⋮ Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes ⋮ Improved cryptanalysis of AES-like permutations ⋮ Strengthening the Known-Key Security Notion for Block Ciphers ⋮ Analysis of the Kupyna-256 Hash Function ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ Analysis of Reduced-SHAvite-3-256 v2 ⋮ Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Statistical integral distinguisher with multi-structure and its application on AES-like ciphers ⋮ Perfect nonlinear functions and cryptography ⋮ Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure ⋮ Distinguisher on full-round compression function of GOST R ⋮ The \texttt{Deoxys} AEAD family ⋮ Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} ⋮ Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags ⋮ Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function ⋮ Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ ⋮ New representations of the AES key schedule ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity ⋮ Boomerang Distinguisher for the SIMD-512 Compression Function ⋮ Revisiting Gilbert's known-key distinguisher ⋮ The MALICIOUS framework: embedding backdoors into tweakable block ciphers ⋮ Cryptanalysis results on spook. Bringing full-round shadow-512 to the light ⋮ The rebound attack and subspace distinguishers: application to Whirlpool ⋮ Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
This page was built for publication: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations