scientific article; zbMATH DE number 1759272
From MaRDI portal
Publication:4537993
Recommendations
Cited in
(81)- Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
- Square attack on 7-round Kiasu-BC
- Practical-time attacks against reduced variants of~MISTY1
- New Impossible Differential Attacks on AES
- A \(2^{70}\) attack on the full MISTY1
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- A Meet-in-the-Middle Attack on 8-Round AES
- Integral characteristics by keyspace partitioning
- A Unified Approach to Related-Key Attacks
- New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- Improved domain extender for the ideal cipher
- New insights on AES-like SPN ciphers
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- Revisiting Gilbert's known-key distinguisher
- Tweaking AES
- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
- Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- A New Attack on the LEX Stream Cipher
- The retracing boomerang attack
- Linear cryptanalysis of reduced-round SPECK
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Improved single-key attacks on 8-round AES-192 and AES-256
- A new structural-differential property of 5-round AES
- Known-Key Distinguishers for Some Block Ciphers
- Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128
- Revisiting key schedule's diffusion in relation with round function's diffusion
- Cryptanalysis of the stream cipher LEX
- SQUARE attack on block ciphers with low algebraic degree
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- An improved binary algorithm for RSA
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- New Related-Key Boomerang Attacks on AES
- Improved cryptanalysis of the AJPS Mersenne based cryptosystem
- scientific article; zbMATH DE number 1759642 (Why is no real title available?)
- Image security system using recursive cellular automata substitution
- Truncated boomerang attacks and application to AES-based ciphers
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Fault based attack of the Rijndael cryptosystem
- Improved Cryptanalysis of Reduced RIPEMD-160
- Attacking 9 and 10 Rounds of AES-256
- A new attack against Khazad
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
- A Five-Round Algebraic Property of the Advanced Encryption Standard
- Problem and improvement of Rijndael key generation algorithm
- Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds
- A note on an infeasible linearization of some block ciphers
- Transposition of AES key schedule
- A client/server implementation of an encryption system for fingerprint user authentication
- New related-key rectangle attacks on reduced AES-192 and AES-256
- Improved BV-based quantum attack on block ciphers
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Mathematical aspects of division property
- Improved Impossible Differential Attacks on Large-Block Rijndael
- Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
- Automatic search for bit-based division property
- Meet-in-the-middle attacks on 10-round AES-256
- The effects of the omission of last round's MixColumns on AES
- Integral cryptanalysis on full MISTY1
- A note on quantum related-key attacks
- Meet-in-the-middle attacks on AES with value constraints
- Advanced Encryption Standard – AES
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
- And Rijndael? Automatic related-key differential analysis of Rijndael
- Quantum boomerang attacks and some applications
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Key structures: improved related-key boomerang attack against the full AES-256
- New representations of the AES key schedule
- Related-cipher attacks: applications to Ballet and ANT
- Automatic boomerang attacks search on Rijndael
- The retracing boomerang attack, with application to reduced-round AES
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher
- Partial sums meet FFT: improved attack on 6-round AES
- scientific article; zbMATH DE number 1950610 (Why is no real title available?)
- Improved truncated differential distinguishers of AES with concrete S-box
- Quantum impossible differential attacks: applications to AES and SKINNY
- Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4537993)