CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
From MaRDI portal
Publication:3801468
Recommendations
Cited in
(16)- A new type of attacks on block ciphers
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- A bit-vector differential model for the modular addition by a constant
- Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications’ Cryptographic Backbone
- Quantum reversible circuit of AES-128
- scientific article; zbMATH DE number 4168393 (Why is no real title available?)
- A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang
- scientific article; zbMATH DE number 2081067 (Why is no real title available?)
- Cryptanalysis of C2
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Known and Chosen Key Differential Distinguishers for Block Ciphers
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- A note on quantum related-key attacks
- Notions and relations for RKA-secure permutation and function families
This page was built for publication: CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3801468)