CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
From MaRDI portal
Publication:3801468
DOI10.1080/0161-118791861749zbMATH Open0654.94008OpenAlexW2000646727WikidataQ121432259 ScholiaQ121432259MaRDI QIDQ3801468FDOQ3801468
Authors: Robert S. Winternitz, Martin Edward Hellman
Publication date: 1987
Published in: Cryptologia (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/0161-118791861749
Recommendations
Cited In (16)
- A new type of attacks on block ciphers
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Notions and relations for RKA-secure permutation and function families
- Quantum reversible circuit of AES-128
- Known and Chosen Key Differential Distinguishers for Block Ciphers
- Cryptanalysis of C2
- Title not available (Why is that?)
- A bit-vector differential model for the modular addition by a constant
- A note on quantum related-key attacks
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Title not available (Why is that?)
- Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications’ Cryptographic Backbone
- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers
- A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
This page was built for publication: CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3801468)