What is the effective key length for a block cipher: an attack on every practical block cipher
From MaRDI portal
Publication:893734
DOI10.1007/S11432-014-5096-6zbMATH Open1357.94068OpenAlexW2071636004WikidataQ123331092 ScholiaQ123331092MaRDI QIDQ893734FDOQ893734
Authors: Xuejia Lai, Jialing Huang
Publication date: 20 November 2015
Published in: Science China Information Sciences (Search for Journal in Brave)
Full work available at URL: http://engine.scichina.com/doi/10.1007/s11432-014-5096-6
Recommendations
- Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
- CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
- Publication:4502733
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
Cites Work
- Piccolo: An Ultra-Lightweight Blockcipher
- New block encryption algorithm MISTY
- PRESENT: An Ultra-Lightweight Block Cipher
- Biclique Cryptanalysis of the Full AES
- Title not available (Why is that?)
- Markov Ciphers and Differential Cryptanalysis
- Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function
- Narrow-bicliques: cryptanalysis of full IDEA
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Improved Attacks on Full GOST
- Security of the SMS4 block cipher against differential cryptanalysis
- Differential attack on five rounds of the SC2000 block cipher
- 256 bit standardized crypto for 650 GE -- GOST revisited
- Information Security and Cryptology - ICISC 2003
Cited In (1)
Uses Software
This page was built for publication: What is the effective key length for a block cipher: an attack on every practical block cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q893734)