Revisiting AES related-key differential attacks with constraint programming
From MaRDI portal
Recommendations
- Computing AES related-key differential characteristics with constraint programming
- And Rijndael? Automatic related-key differential analysis of Rijndael
- Related-key impossible differential attacks on reduced-round AES-256
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Revisiting related-key boomerang attacks on AES using computer-aided tool
Cites work
- scientific article; zbMATH DE number 1394311 (Why is no real title available?)
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Differential Cryptanalysis of Feal and N-Hash
- Distinguisher and Related-Key Attack on the Full AES-256
- Known-Key Distinguishers for Some Block Ciphers
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Revisiting AES related-key differential attacks with constraint programming
- Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
Cited in
(10)- Computing AES related-key differential characteristics with constraint programming
- Side-channel cryptographic attacks using pseudo-Boolean optimization
- A SAT-Based Approach for Index Calculus on Binary Elliptic Curves
- Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128
- Differential meet-in-the-middle cryptanalysis
- And Rijndael? Automatic related-key differential analysis of Rijndael
- A strong key expansion algorithm based on nondegenerate 2D chaotic map over \(\mathrm{GF}(2^n)\)
- Variants of the AES key schedule for better truncated differential bounds
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- Revisiting AES related-key differential attacks with constraint programming
This page was built for publication: Revisiting AES related-key differential attacks with constraint programming
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1799563)