The key-dependent attack on block ciphers
From MaRDI portal
Publication:3650682
DOI10.1007/978-3-642-10366-7_2zbMATH Open1267.94098OpenAlexW1514715287MaRDI QIDQ3650682FDOQ3650682
Authors: Xiaorui Sun, Xuejia Lai
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_2
Recommendations
Cited In (16)
- Improved attacks on reduced-round Camellia-128/192/256
- Towards Understanding the Known-Key Security of Block Ciphers
- Title not available (Why is that?)
- Differential entropy analysis of the IDEA block cipher
- New attacks on IDEA with at least 6 rounds
- Title not available (Why is that?)
- A Statistical Saturation Attack against the Block Cipher PRESENT
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Building Secure Block Ciphers on Generic Attacks Assumptions
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
- Topics in Cryptology – CT-RSA 2006
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Blockwise \(p\)-tampering attacks on cryptographic primitives, extractors, and learners
- Cryptanalysis of \textsc{Widea}
- Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
This page was built for publication: The key-dependent attack on block ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3650682)