Related-Key Boomerang and Rectangle Attacks

From MaRDI portal
Publication:5385748

DOI10.1007/11426639_30zbMath1137.94338OpenAlexW1515958737MaRDI QIDQ5385748

Eli Biham, Nathan Keller, Orr Dunkelman

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_30




Related Items

Boomerang Attacks on Hash Function Using Auxiliary DifferentialsImproved (related-key) differential cryptanalysis on GIFTBoomerang Attack on Step-Reduced SHA-512The Boomerang Attacks on the Round-Reduced Skein-512An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key SecurityWeak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering SchemesKey guessing strategies for linear key-schedule algorithms in rectangle attacksImproved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTSecure Message Authentication Against Related-Key AttackKey structures: improved related-key boomerang attack against the full AES-256On the related-key attack security of authenticated encryption schemesMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Differential meet-in-the-middle cryptanalysisCryptanalysis of Reduced-Round SMS4 Block CipherAutomatic boomerang attacks search on RijndaelCritique of the related-key attack conceptA Unified Approach to Related-Key AttacksA Meet-in-the-Middle Attack on 8-Round AESTransposition of AES Key ScheduleNew Applications of Differential Bounds of the SDS StructureCryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephonyRelated-key security for pseudorandom functions beyond the linear barrierNotions and relations for RKA-secure permutation and function familiesThe (related-key) impossible boomerang attack and its application to the AES block cipherNew related-key rectangle attacks on reduced AES-192 and AES-256The Delicate Issues of Addition with Respect to XOR DifferencesRelated-Key Differential-Linear Attacks on Reduced AES-192Tweaking AESAttacking 9 and 10 Rounds of AES-256Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHTUnnamed ItemNew Related-Key Boomerang Attacks on AESReflection Cryptanalysis of Some Ciphers