Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting

From MaRDI portal
Publication:4924422

DOI10.1007/978-3-642-38348-9_23zbMath1306.94044OpenAlexW1901931695MaRDI QIDQ4924422

Pierre-Alain Fouque, Patrick Derbez, Jérémy Jean

Publication date: 31 May 2013

Published in: Advances in Cryptology – EUROCRYPT 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-38348-9_23




Related Items (43)

Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksStreebog compression function as PRF in secret-key settingsMeet-in-the-middle attacks on 10-round AES-256Extended meet-in-the-middle attacks on some Feistel constructionsPholkos -- efficient large-state tweakable block ciphers from the AES round functionGeneral Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block CipherKey guessing strategies for linear key-schedule algorithms in rectangle attacksMeet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESMeet-in-the-middle attack with splice-and-cut technique and a general automatic frameworkMeet-in-the-middle attacks and structural analysis of round-reduced PRINCEExploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNYMeet-in-the-middle preimage attacks on sponge-based hashingTriangulating rebound attack on AES-like hashingKey structures: improved related-key boomerang attack against the full AES-256Quantum impossible differential attacks: applications to AES and SKINNYMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Revisiting related-key boomerang attacks on AES using computer-aided toolDifferential meet-in-the-middle cryptanalysisAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsImproved truncated differential distinguishers of AES with concrete S-boxThe phantom of differential characteristicsImpossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BCSPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsTransposition of AES Key ScheduleAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINEEfficient Design Strategies Based on the AES Round FunctionОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESImproved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512Making the impossible possibleKey recovery attacks on reduced-round Joltik-BC in the single-key settingImproved Attacks on Reduced-Round Camellia-128/192/256Improved key recovery attacks on reduced-round AES with practical data and memory complexitiesImproved single-key attacks on 8-round AES-192 and AES-256Improved Meet-in-the-Middle Distinguisher on Feistel SchemesAnalysis of the CAESAR Candidate SilverThe \texttt{Deoxys} AEAD familyNew representations of the AES key scheduleSquare Attack on 7-Round Kiasu-BCAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksNew Insights on AES-Like SPN CiphersQuantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AESTNT: how to tweak a block cipher




This page was built for publication: Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting