What is the effective key length for a block cipher: an attack on every practical block cipher
From MaRDI portal
Publication:893734
Recommendations
- Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
- CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
- Publication:4502733
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
Cites work
- scientific article; zbMATH DE number 697813 (Why is no real title available?)
- 256 bit standardized crypto for 650 GE -- GOST revisited
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Biclique Cryptanalysis of the Full AES
- Differential attack on five rounds of the SC2000 block cipher
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Improved Attacks on Full GOST
- Information Security and Cryptology - ICISC 2003
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Markov Ciphers and Differential Cryptanalysis
- Narrow-bicliques: cryptanalysis of full IDEA
- New block encryption algorithm MISTY
- PRESENT: An Ultra-Lightweight Block Cipher
- Piccolo: An Ultra-Lightweight Blockcipher
- Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function
- Security of the SMS4 block cipher against differential cryptanalysis
This page was built for publication: What is the effective key length for a block cipher: an attack on every practical block cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q893734)