Improved cryptanalysis of AES-like permutations
From MaRDI portal
Publication:484330
DOI10.1007/s00145-013-9156-7zbMath1301.94118OpenAlexW1977329611MaRDI QIDQ484330
María Naya-Plasencia, Jérémy Jean, Thomas Peyrin
Publication date: 7 January 2015
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-013-9156-7
Related Items (1)
Cites Work
- Unnamed Item
- Advances in cryptology -- ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6--10, 2009. Proceedings
- Improved Analysis of ECHO-256
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Higher-Order Differential Properties of Keccak and Luffa
- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
- Known and Chosen Key Differential Distinguishers for Block Ciphers
- The LED Block Cipher
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Cryptanalysis of Grindahl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved Differential Attacks for ECHO and Grøstl
- Rebound Attack on the Full Lane Compression Function
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Improved Rebound Attack on the Finalist Grøstl
- Rebound Attacks on the Reduced Grøstl Hash Function
- How to Improve Rebound Attacks
- The PHOTON Family of Lightweight Hash Functions
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
This page was built for publication: Improved cryptanalysis of AES-like permutations