Pages that link to "Item:Q3525664"
From MaRDI portal
The following pages link to A Meet-in-the-Middle Attack on 8-Round AES (Q3525664):
Displaying 40 items.
- An improved preimage attack against \texttt{HAVAL-3} (Q477698) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- The effects of the omission of last round's MixColumns on AES (Q991791) (← links)
- Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 (Q1741915) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- New representations of the AES key schedule (Q2056670) (← links)
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES (Q2118720) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE (Q2188966) (← links)
- Key recovery attacks on reduced-round Joltik-BC in the single-key setting (Q2274520) (← links)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher (Q2437779) (← links)
- Revisiting key schedule's diffusion in relation with round function's diffusion (Q2510656) (← links)
- Improved single-key attacks on 8-round AES-192 and AES-256 (Q2516521) (← links)
- Meet-in-the-middle attacks on 10-round AES-256 (Q2630710) (← links)
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- Improved Attacks on Reduced-Round Camellia-128/192/256 (Q2790031) (← links)
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes (Q2807199) (← links)
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks (Q2829214) (← links)
- New Insights on AES-Like SPN Ciphers (Q2835602) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 (Q2946449) (← links)
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES (Q2946895) (← links)
- Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm (Q2958128) (← links)
- SPF: A New Family of Efficient Format-Preserving Encryption Algorithms (Q2980846) (← links)
- Transposition of AES Key Schedule (Q2980847) (← links)
- A Single-Key Attack on the Full GOST Block Cipher (Q3013090) (← links)
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool (Q3013095) (← links)
- Tweaking AES (Q3084255) (← links)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN (Q3084257) (← links)
- General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher (Q3193263) (← links)
- Improved Impossible Differential Attacks on Large-Block Rijndael (Q3540153) (← links)
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES (Q5151046) (← links)
- New Impossible Differential Attacks on AES (Q5504630) (← links)
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities (Q5918865) (← links)
- Quantum meet-in-the-middle attack on Feistel construction (Q6043544) (← links)
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework (Q6048704) (← links)
- Quantum impossible differential attacks: applications to AES and SKINNY (Q6130615) (← links)
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher (Q6489784) (← links)
- New Demiric–Selçuk meet-in-the-middle attacks on Misty and Feistel schemes (Q6498721) (← links)