Practical-time attacks against reduced variants of~MISTY1
From MaRDI portal
(Redirected from Publication:494594)
Recommendations
Cites work
- scientific article; zbMATH DE number 2089127 (Why is no real title available?)
- scientific article; zbMATH DE number 2089131 (Why is no real title available?)
- scientific article; zbMATH DE number 1808210 (Why is no real title available?)
- scientific article; zbMATH DE number 1759655 (Why is no real title available?)
- scientific article; zbMATH DE number 1759272 (Why is no real title available?)
- scientific article; zbMATH DE number 1418249 (Why is no real title available?)
- A Unified Approach to Related-Key Attacks
- A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
- An Improved Impossible Differential Attack on MISTY1
- Improved Integral Attacks on MISTY1
- New block encryption algorithm MISTY
- New types of cryptanalytic attacks using related keys
- On MISTY1 Higher Order Differential Cryptanalysis
- The block cipher \textsc{Square}
- The security of Feistel ciphers with six rounds or less
Cited in
(7)- Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis
- Integral cryptanalysis on full MISTY1
- An Improved Impossible Differential Attack on MISTY1
- A \(2^{70}\) attack on the full MISTY1
- Improved higher-order differential attacks on MISTY1
- scientific article; zbMATH DE number 2089127 (Why is no real title available?)
- scientific article; zbMATH DE number 1808210 (Why is no real title available?)
This page was built for publication: Practical-time attacks against reduced variants of~MISTY1
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q494594)