Pages that link to "Item:Q3058655"
From MaRDI portal
The following pages link to Improved Single-Key Attacks on 8-Round AES-192 and AES-256 (Q3058655):
Displaying 37 items.
- Cryptanalysis of GOST R hash function (Q402352) (← links)
- Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 (Q1741915) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- Cryptanalysis of the stream cipher LEX (Q1949239) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- New representations of the AES key schedule (Q2056670) (← links)
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES (Q2118720) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE (Q2188966) (← links)
- Key recovery attacks on reduced-round Joltik-BC in the single-key setting (Q2274520) (← links)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher (Q2437779) (← links)
- Revisiting key schedule's diffusion in relation with round function's diffusion (Q2510656) (← links)
- Meet-in-the-middle attacks on 10-round AES-256 (Q2630710) (← links)
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- Improved Attacks on Reduced-Round Camellia-128/192/256 (Q2790031) (← links)
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes (Q2807199) (← links)
- A novel key scheduling scheme for AES algorithm (Q2825266) (← links)
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks (Q2829214) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 (Q2946449) (← links)
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES (Q2946895) (← links)
- Transposition of AES Key Schedule (Q2980847) (← links)
- A Single-Key Attack on the Full GOST Block Cipher (Q3013090) (← links)
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool (Q3013095) (← links)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN (Q3084257) (← links)
- General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher (Q3193263) (← links)
- Improving the Biclique Cryptanalysis of AES (Q3194588) (← links)
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Q4639481) (← links)
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES (Q5151046) (← links)
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher (Q6489784) (← links)
- Meet-in-the-filter and dynamic counting with applications to \textsc{Speck} (Q6535077) (← links)
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging (Q6536217) (← links)
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery (Q6536744) (← links)
- Meet-in-the-middle attacks on AES with value constraints (Q6591952) (← links)
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher (Q6636108) (← links)
- New representations of the AES key schedule (Q6639505) (← links)