Related-cipher attacks: applications to Ballet and ANT
From MaRDI portal
Publication:6535481
DOI10.1007/978-3-031-35486-1_6zbMATH Open1545.94073MaRDI QIDQ6535481FDOQ6535481
Authors: Yongxia Mao, Wenling Wu, Yafei Zheng, Lei Zhang
Publication date: 11 January 2024
Recommendations
- scientific article; zbMATH DE number 1980981
- Related-Key Boomerang and Rectangle Attacks
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- On cipher-dependent related-key attacks in the ideal-cipher model
- Fast Software Encryption
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- New types of cryptanalytic attacks using related keys
- Title not available (Why is that?)
- A Meet-in-the-Middle Attack on 8-Round AES
- Title not available (Why is that?)
- Improved impossible differential cryptanalysis of 7-round AES-128
- The block cipher \textsc{Square}
- Ciphers for MPC and FHE
- The \textsf{Simeck} family of lightweight block ciphers
- Multi-key security: the Even-Mansour construction revisited
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Title not available (Why is that?)
This page was built for publication: Related-cipher attacks: applications to Ballet and ANT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535481)