Related-Key Boomerang and Rectangle Attacks
From MaRDI portal
Publication:5385748
DOI10.1007/11426639_30zbMath1137.94338OpenAlexW1515958737MaRDI QIDQ5385748
Eli Biham, Nathan Keller, Orr Dunkelman
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_30
Related Items
Boomerang Attacks on Hash Function Using Auxiliary Differentials ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ Boomerang Attack on Step-Reduced SHA-512 ⋮ The Boomerang Attacks on the Round-Reduced Skein-512 ⋮ An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Secure Message Authentication Against Related-Key Attack ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ On the related-key attack security of authenticated encryption schemes ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Cryptanalysis of Reduced-Round SMS4 Block Cipher ⋮ Automatic boomerang attacks search on Rijndael ⋮ Critique of the related-key attack concept ⋮ A Unified Approach to Related-Key Attacks ⋮ A Meet-in-the-Middle Attack on 8-Round AES ⋮ Transposition of AES Key Schedule ⋮ New Applications of Differential Bounds of the SDS Structure ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ Notions and relations for RKA-secure permutation and function families ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ New related-key rectangle attacks on reduced AES-192 and AES-256 ⋮ The Delicate Issues of Addition with Respect to XOR Differences ⋮ Related-Key Differential-Linear Attacks on Reduced AES-192 ⋮ Tweaking AES ⋮ Attacking 9 and 10 Rounds of AES-256 ⋮ Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT ⋮ Unnamed Item ⋮ New Related-Key Boomerang Attacks on AES ⋮ Reflection Cryptanalysis of Some Ciphers