The key-dependent attack on block ciphers
From MaRDI portal
Publication:3650682
Recommendations
Cited in
(16)- Building Secure Block Ciphers on Generic Attacks Assumptions
- Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
- Differential entropy analysis of the IDEA block cipher
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
- Blockwise \(p\)-tampering attacks on cryptographic primitives, extractors, and learners
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Towards Understanding the Known-Key Security of Block Ciphers
- scientific article; zbMATH DE number 2081067 (Why is no real title available?)
- A simple power analysis attack against the key schedule of the Camellia block cipher
- scientific article; zbMATH DE number 5544831 (Why is no real title available?)
- New attacks on IDEA with at least 6 rounds
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
- Cryptanalysis of \textsc{Widea}
- Improved attacks on reduced-round Camellia-128/192/256
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: The key-dependent attack on block ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3650682)