New Impossible Differential Attacks on AES
From MaRDI portal
Publication:5504630
DOI10.1007/978-3-540-89754-5_22zbMATH Open1203.94113OpenAlexW1545756401MaRDI QIDQ5504630FDOQ5504630
Authors: Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim
Publication date: 22 January 2009
Published in: Progress in Cryptology - INDOCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89754-5_22
Recommendations
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- Improved impossible differential cryptanalysis of 7-round AES-128
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
- Impossible differential cryptanalysis of advanced encryption standard
- Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Title not available (Why is that?)
- A Meet-in-the-Middle Attack on 8-Round AES
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- Impossible differential cryptanalysis of advanced encryption standard
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
Cited In (39)
- Improved impossible differential cryptanalysis of 7-round AES-128
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
- Towards key-dependent integral and impossible differential distinguishers on 5-round AES
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- TNT: how to tweak a block cipher
- Impossible differential cryptanalysis using matrix method
- Making the impossible possible
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Impossible differential cryptanalysis of mini-AES
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- Meet-in-the-middle attacks on AES with value constraints
- Meet-in-the-middle attacks on 10-round AES-256
- The effects of the omission of last round's MixColumns on AES
- A Probing Attack on AES
- Impossible differentials of SPN ciphers
- Tweaking AES
- Generalized Feistel networks revisited
- Impossible differential cryptanalysis of advanced encryption standard
- Square attack on 7-round Kiasu-BC
- Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Finding all impossible differentials when considering the DDT
- New insights on AES-like SPN ciphers
- On impossible truncated differentials of XSL ciphers
- Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Key structures: improved related-key boomerang attack against the full AES-256
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
- Almost universal forgery attacks on AES-based MAC's
- Improved single-key attacks on 8-round AES-192 and AES-256
- Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- A new impossible differential attack on SAFER ciphers
- On computational complexity of impossible differential cryptanalysis
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Non-existence of one-byte active impossible differentials for 5-round AES in the master-key setting
This page was built for publication: New Impossible Differential Attacks on AES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5504630)