Recommendations
- Weak keys for AEZ, and the external key padding attack
- Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
- Distinguisher and Related-Key Attack on the Full AES-256
- Information and Communications Security
- Faster chosen-key distinguishers on reduced-round AES
- Selected Areas in Cryptography
- Known-Key Distinguishers for Some Block Ciphers
- Publication:4945382
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 4033663 (Why is no real title available?)
- scientific article; zbMATH DE number 503238 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- A new structural-differential property of 5-round AES
- A simplified representation of AES
- Advanced Encryption Standard – AES
- Algebraic aspects of the advanced encryption standard.
- Distinguisher and Related-Key Attack on the Full AES-256
- Faster chosen-key distinguishers on reduced-round AES
- Known-Key Distinguishers for Some Block Ciphers
- Multiple limited-birthday distinguishers and applications
- Proving resistance against invariant attacks: how to choose the round constants
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Revisiting Gilbert's known-key distinguisher
- Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- The random oracle methodology, revisited.
- The rebound attack and subspace distinguishers: application to Whirlpool
- Understanding Two-Round Differentials in AES
- Variants of the AES key schedule for better truncated differential bounds
Cited in
(6)- Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
- Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
- Fast Software Encryption
- New representations of the AES key schedule
- Faster chosen-key distinguishers on reduced-round AES
- Fast chosen-key distinguish attacks on round-reduced AES-192
This page was built for publication: Weak-key distinguishers for AES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832335)