scientific article; zbMATH DE number 1759272
From MaRDI portal
Publication:4537993
zbMATH Open0994.68631MaRDI QIDQ4537993FDOQ4537993
Authors: Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Mike Stay, David Wagner, Doug Whiting
Publication date: 25 June 2002
Title of this publication is not available (Why is that?)
Recommendations
Cited In (80)
- Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
- A New Attack on the LEX Stream Cipher
- Improved Cryptanalysis of Reduced RIPEMD-160
- A client/server implementation of an encryption system for fingerprint user authentication
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
- Integral characteristics by keyspace partitioning
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- Integral cryptanalysis on full MISTY1
- A Meet-in-the-Middle Attack on 8-Round AES
- Meet-in-the-middle attacks on 10-round AES-256
- The effects of the omission of last round's MixColumns on AES
- Improved cryptanalysis of the AJPS Mersenne based cryptosystem
- Image security system using recursive cellular automata substitution
- A new attack against Khazad
- Improved BV-based quantum attack on block ciphers
- Tweaking AES
- A Unified Approach to Related-Key Attacks
- Known-Key Distinguishers for Some Block Ciphers
- New Related-Key Boomerang Attacks on AES
- Fault based attack of the Rijndael cryptosystem
- Automatic search for bit-based division property
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- A Five-Round Algebraic Property of the Advanced Encryption Standard
- A note on quantum related-key attacks
- Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
- Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds
- New related-key rectangle attacks on reduced AES-192 and AES-256
- Mathematical aspects of division property
- Improved Impossible Differential Attacks on Large-Block Rijndael
- Improved domain extender for the ideal cipher
- An improved binary algorithm for RSA
- Transposition of AES Key Schedule
- The retracing boomerang attack
- Linear cryptanalysis of reduced-round SPECK
- Truncated boomerang attacks and application to AES-based ciphers
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- A New Structural-Differential Property of 5-Round AES
- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
- Square Attack on 7-Round Kiasu-BC
- A $$2^{70}$$ Attack on the Full MISTY1
- A note on an infeasible linearization of some block ciphers
- Revisiting Gilbert's known-key distinguisher
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
- Revisiting key schedule's diffusion in relation with round function's diffusion
- Cryptanalysis of the stream cipher LEX
- New Insights on AES-Like SPN Ciphers
- Problem and improvement of Rijndael key generation algorithm
- New Impossible Differential Attacks on AES
- Practical-time attacks against reduced variants of~MISTY1
- Improved single-key attacks on 8-round AES-192 and AES-256
- Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
- SQUARE attack on block ciphers with low algebraic degree
- Title not available (Why is that?)
- Attacking 9 and 10 Rounds of AES-256
- New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
- Title not available (Why is that?)
- And Rijndael? Automatic related-key differential analysis of Rijndael
- Meet-in-the-middle attacks on AES with value constraints
- The retracing boomerang attack, with application to reduced-round AES
- Improved truncated differential distinguishers of AES with concrete S-box
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Quantum boomerang attacks and some applications
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Key structures: improved related-key boomerang attack against the full AES-256
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher
- Partial sums meet FFT: improved attack on 6-round AES
- Advanced Encryption Standard – AES
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
- New representations of the AES key schedule
- Related-cipher attacks: applications to Ballet and ANT
- Quantum impossible differential attacks: applications to AES and SKINNY
- Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4537993)