Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
From MaRDI portal
Publication:6489784
Recommendations
- scientific article; zbMATH DE number 3487529
- scientific article; zbMATH DE number 3080938
- scientific article; zbMATH DE number 3407754
- Eine Bemerkung zum Satz von Vitali über Konvergenz von Funktionenfolgen: Dem stets hilftsbereiten Herrn Kollegen H. L. Schmid, gewidmet
- scientific article; zbMATH DE number 1839786
- Holomorphic mappings of complex manifolds
- scientific article; zbMATH DE number 5593209
- On \(\varepsilon\)-representations
- scientific article; zbMATH DE number 3148394
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- scientific article; zbMATH DE number 1759272 (Why is no real title available?)
- A Meet-in-the-Middle Attack on 8-Round AES
- A cryptanalytic time-memory trade-off
- Automatic search of meet-in-the-middle and impossible differential attacks
- Biclique Cryptanalysis of the Full AES
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Improved single-key attacks on 8-round AES-192 and AES-256
- Improved single-key attacks on 9-round AES-192/256
- Meet-in-the-middle attacks on 10-round AES-256
- New Impossible Differential Attacks on AES
- New Results on Impossible Differential Cryptanalysis of Reduced AES
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Understanding Two-Round Differentials in AES
Cited in
(2)
This page was built for publication: Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6489784)