Reflection Cryptanalysis of Some Ciphers
From MaRDI portal
Publication:5504631
DOI10.1007/978-3-540-89754-5_23zbMath1203.94106OpenAlexW1524508699MaRDI QIDQ5504631
Publication date: 22 January 2009
Published in: Progress in Cryptology - INDOCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89754-5_23
CryptanalysisSelf-similarityBlock CipherKey ScheduleReflection attackRelated Key AttackRound FunctionRound KeySlide Attack
Related Items (15)
Aggregated differentials and cryptanalysis of PP-1 and GOST ⋮ Quantum attacks on some Feistel block ciphers ⋮ Efficient slide attacks ⋮ Reflection Cryptanalysis of PRINCE-Like Ciphers ⋮ A single-key attack on the full GOST block cipher ⋮ Square reflection cryptanalysis of 5-round Feistel networks with permutations ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Атака на ГОСТ с уменьшенным числом итераций методом согласования ⋮ CRYPTANALYSIS OF GOST IN THE MULTIPLE-KEY SCENARIO ⋮ A Single-Key Attack on the Full GOST Block Cipher ⋮ Reflection ciphers ⋮ Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами ⋮ Reflection cryptanalysis of PRINCE-like ciphers ⋮ Unnamed Item ⋮ Unnamed Item
Uses Software
Cites Work
- New types of cryptanalytic attacks using related keys
- Decorrelation: a theory for block cipher security
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Improved Slide Attacks
- A New Class of Weak Keys for Blowfish
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- A Unified Approach to Related-Key Attacks
- Algebraic and Slide Attacks on KeeLoq
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys
- Related-Key Boomerang and Rectangle Attacks
- A Simple Related-Key Attack on the Full SHACAL-1
- Related-Key Rectangle Attack on the Full SHACAL-1
- New Cryptanalytic Results on IDEA
- Fast Software Encryption
- Fast Software Encryption
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Reflection Cryptanalysis of Some Ciphers