Related-cipher attacks: applications to Ballet and ANT
From MaRDI portal
Publication:6535481
Recommendations
- scientific article; zbMATH DE number 1980981
- Related-Key Boomerang and Rectangle Attacks
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- On cipher-dependent related-key attacks in the ideal-cipher model
- Fast Software Encryption
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 2089131 (Why is no real title available?)
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- scientific article; zbMATH DE number 1980981 (Why is no real title available?)
- scientific article; zbMATH DE number 1759272 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- A Meet-in-the-Middle Attack on 8-Round AES
- Ciphers for MPC and FHE
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Improved impossible differential cryptanalysis of 7-round AES-128
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Multi-key security: the Even-Mansour construction revisited
- New types of cryptanalytic attacks using related keys
- The \textsf{Simeck} family of lightweight block ciphers
- The block cipher \textsc{Square}
This page was built for publication: Related-cipher attacks: applications to Ballet and ANT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535481)