Practical-time attacks against reduced variants of~MISTY1
From MaRDI portal
Publication:494594
DOI10.1007/S10623-014-9980-2zbMATH Open1359.94588OpenAlexW2027933939MaRDI QIDQ494594FDOQ494594
Authors: Orr Dunkelman, Nathan Keller
Publication date: 1 September 2015
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-014-9980-2
Recommendations
Cites Work
- New block encryption algorithm MISTY
- The security of Feistel ciphers with six rounds or less
- New types of cryptanalytic attacks using related keys
- Title not available (Why is that?)
- Title not available (Why is that?)
- On MISTY1 Higher Order Differential Cryptanalysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Unified Approach to Related-Key Attacks
- A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
- An Improved Impossible Differential Attack on MISTY1
- Improved Integral Attacks on MISTY1
- The block cipher \textsc{Square}
- Title not available (Why is that?)
Cited In (7)
- Integral cryptanalysis on full MISTY1
- An Improved Impossible Differential Attack on MISTY1
- A \(2^{70}\) attack on the full MISTY1
- Improved higher-order differential attacks on MISTY1
- Title not available (Why is that?)
- Title not available (Why is that?)
- Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis
Uses Software
This page was built for publication: Practical-time attacks against reduced variants of~MISTY1
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q494594)