Known-Key Distinguishers for Some Block Ciphers
From MaRDI portal
Publication:5387107
DOI10.1007/978-3-540-76900-2_19zbMath1153.94403OpenAlexW1826962815MaRDI QIDQ5387107
Vincent Rijmen, Lars R. Knudsen
Publication date: 15 May 2008
Published in: Advances in Cryptology – ASIACRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76900-2_19
Related Items (42)
Weak-key distinguishers for AES ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique ⋮ Multi-key Security: The Even-Mansour Construction Revisited ⋮ New criterion for diffusion property and applications to improved GFS and EGFN ⋮ Fast garbling of circuits under standard assumptions ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ Masking Tables—An Underestimated Security Risk ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls ⋮ How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? ⋮ Cryptanalysis of Ciminion ⋮ On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ Distinguishing error of nonlinear invariant attacks ⋮ Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting ⋮ On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ Integral distinguishers for reduced-round Stribog ⋮ Rotational cryptanalysis on MAC algorithm chaskey ⋮ Strengthening the Known-Key Security Notion for Block Ciphers ⋮ Linear Analysis of Reduced-Round CubeHash ⋮ Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function ⋮ Higher-Order Differential Properties of Keccak and Luffa ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes ⋮ Statistical integral distinguisher with multi-structure and its application on AES-like ciphers ⋮ On Integral Distinguishers of Rijndael Family of Ciphers ⋮ Truncated differential based known-key attacks on round-reduced SIMON ⋮ Public-Seed Pseudorandom Permutations ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Cryptanalysis of the GOST Hash Function ⋮ Revisiting AES related-key differential attacks with constraint programming ⋮ Distinguisher on full-round compression function of GOST R ⋮ Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 ⋮ Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks ⋮ Cryptanalysis of Tweaked Versions of SMASH and Reparation ⋮ Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity ⋮ New Insights on AES-Like SPN Ciphers ⋮ Revisiting Gilbert's known-key distinguisher ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems ⋮ The rebound attack and subspace distinguishers: application to Whirlpool
Cites Work
This page was built for publication: Known-Key Distinguishers for Some Block Ciphers