Cryptanalysis of AES and Camellia with related S-boxes
From MaRDI portal
Publication:4924682
DOI10.1007/978-3-642-38553-7_12zbMATH Open1312.94075OpenAlexW108328261MaRDI QIDQ4924682FDOQ4924682
Authors: Marco MacChetti
Publication date: 7 June 2013
Published in: Progress in Cryptology – AFRICACRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-38553-7_12
Recommendations
Cited In (16)
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes
- Cryptographic properties of modified AES-like S-boxes
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Title not available (Why is that?)
- Cryptanalysis of C2
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- A simple power analysis attack against the key schedule of the Camellia block cipher
- Security of the AES with a secret S-box
- Toward reverse engineering on secret \(S\)-boxes in block ciphers
- Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
- Title not available (Why is that?)
- On some probabilistic approximations for AES-like S-boxes
- Security analysis of S-boxes in symmetric ciphers
- Advanced Encryption Standard – AES
- Plaintext recovery in DES-like cryptosystems based on S-boxes with embedded parity check
This page was built for publication: Cryptanalysis of AES and Camellia with related S-boxes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4924682)