Practical-time related-key attack on GOST with secret S-boxes
From MaRDI portal
Publication:6145945
DOI10.1007/978-3-031-38548-3_7OpenAlexW4385654260MaRDI QIDQ6145945
Nathan Keller, Ariel Weizmann, Orr Dunkelman
Publication date: 2 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-38548-3_7
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- New types of cryptanalytic attacks using related keys
- The first collision for full SHA-1
- A single-key attack on the full GOST block cipher
- Cryptanalysis of SHA-0 and reduced SHA-1
- Efficient slide attacks
- An Improved Differential Attack on Full GOST
- A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules
- Complementing Feistel Ciphers
- Introduction to Random Graphs
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- A (Second) Preimage Attack on the GOST Hash Function
- Cryptanalysis of the GOST Hash Function
- Improved Attacks on Full GOST
- Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами
- Пригодная для низкоресурсной реализации модификация блочного шифра ГОСТ
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
- Advances in Cryptology – CRYPTO 2004
- Finding Collisions in the Full SHA-1
- Fast Software Encryption
This page was built for publication: Practical-time related-key attack on GOST with secret S-boxes