Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
From MaRDI portal
Publication:4924422
DOI10.1007/978-3-642-38348-9_23zbMath1306.94044OpenAlexW1901931695MaRDI QIDQ4924422
Pierre-Alain Fouque, Patrick Derbez, Jérémy Jean
Publication date: 31 May 2013
Published in: Advances in Cryptology – EUROCRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-38348-9_23
Related Items (43)
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Streebog compression function as PRF in secret-key settings ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 ⋮ Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE ⋮ Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Triangulating rebound attack on AES-like hashing ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Quantum impossible differential attacks: applications to AES and SKINNY ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Revisiting related-key boomerang attacks on AES using computer-aided tool ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ The phantom of differential characteristics ⋮ Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ Transposition of AES Key Schedule ⋮ Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE ⋮ Efficient Design Strategies Based on the AES Round Function ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 ⋮ Making the impossible possible ⋮ Key recovery attacks on reduced-round Joltik-BC in the single-key setting ⋮ Improved Attacks on Reduced-Round Camellia-128/192/256 ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Improved single-key attacks on 8-round AES-192 and AES-256 ⋮ Improved Meet-in-the-Middle Distinguisher on Feistel Schemes ⋮ Analysis of the CAESAR Candidate Silver ⋮ The \texttt{Deoxys} AEAD family ⋮ New representations of the AES key schedule ⋮ Square Attack on 7-Round Kiasu-BC ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ New Insights on AES-Like SPN Ciphers ⋮ Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES ⋮ TNT: how to tweak a block cipher
This page was built for publication: Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting