A Related-Key Rectangle Attack on the Full KASUMI
From MaRDI portal
Publication:5451084
Recommendations
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- On related-key attacks and KASUMI: the case of A5/3
- A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
- Improved cryptanalysis of the block cipher KASUMI
- scientific article; zbMATH DE number 2089313
Cited in
(20)- On related-key attacks and KASUMI: the case of A5/3
- Cryptanalysis of Reduced-Round SMS4 Block Cipher
- Improved cryptanalysis of the block cipher KASUMI
- Fast Software Encryption
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Practical attack on the full MMB block cipher
- A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
- A Weak Key Class of XTEA for a Related-Key Rectangle Attack
- Secure message authentication against related-key attack
- LBlock: a lightweight block cipher
- scientific article; zbMATH DE number 2081070 (Why is no real title available?)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Correlation power analysis on KASUMI: attack and countermeasure
- scientific article; zbMATH DE number 2089313 (Why is no real title available?)
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
- Related-key attack on 5-round Kuznyechik
- How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Hash functions from defective ideal ciphers
- Notions and relations for RKA-secure permutation and function families
This page was built for publication: A Related-Key Rectangle Attack on the Full KASUMI
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451084)