Information Security and Privacy
From MaRDI portal
Publication:5315250
DOI10.1007/b98755zbMath1098.94619OpenAlexW4299784765WikidataQ56387667 ScholiaQ56387667MaRDI QIDQ5315250
Jongsung Kim, Dowon Hong, Sang Jin Lee, Guil Kim, Seokhie Hong
Publication date: 7 September 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98755
Related Items (13)
Improved (related-key) differential cryptanalysis on GIFT ⋮ Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ A Unified Approach to Related-Key Attacks ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ Notions and relations for RKA-secure permutation and function families ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ New related-key rectangle attacks on reduced AES-192 and AES-256 ⋮ Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA ⋮ The Delicate Issues of Addition with Respect to XOR Differences ⋮ Attacking 9 and 10 Rounds of AES-256
This page was built for publication: Information Security and Privacy