Pages that link to "Item:Q3650681"
From MaRDI portal
The following pages link to Related-Key Cryptanalysis of the Full AES-192 and AES-256 (Q3650681):
Displayed 50 items.
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (Q484333) (← links)
- MJH: a faster alternative to MDC-2 (Q498970) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- Obtaining and solving systems of equations in key variables only for the small variants of AES (Q626949) (← links)
- Some (in)sufficient conditions for secure hybrid encryption (Q710738) (← links)
- The DBlock family of block ciphers (Q893839) (← links)
- The effects of the omission of last round's MixColumns on AES (Q991791) (← links)
- Variants of the AES key schedule for better truncated differential bounds (Q1726661) (← links)
- Revisiting AES related-key differential attacks with constraint programming (Q1799563) (← links)
- Related-key security for pseudorandom functions beyond the linear barrier (Q1994635) (← links)
- On the boomerang uniformity of quadratic permutations (Q2004976) (← links)
- Low \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse function (Q2043405) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- The retracing boomerang attack (Q2055612) (← links)
- New representations of the AES key schedule (Q2056670) (← links)
- Provable related-key security of contracting Feistel networks (Q2057179) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- The phantom of differential characteristics (Q2205883) (← links)
- Rotational cryptanalysis on MAC algorithm chaskey (Q2229269) (← links)
- Investigations on \(c\)-boomerang uniformity and perfect nonlinearity (Q2231773) (← links)
- New attacks on IDEA with at least 6 rounds (Q2344046) (← links)
- Critique of the related-key attack concept (Q2430685) (← links)
- Improved single-key attacks on 8-round AES-192 and AES-256 (Q2516521) (← links)
- Meet-in-the-middle attacks on 10-round AES-256 (Q2630710) (← links)
- Hash Functions from Defective Ideal Ciphers (Q2790047) (← links)
- Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework (Q2817822) (← links)
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo (Q2874334) (← links)
- Practical Attack on the Full MMB Block Cipher (Q2889870) (← links)
- <i>Nimix:</i>An involutary nonlinear vectorial boolean function (Q2892109) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES (Q2946895) (← links)
- Transposition of AES Key Schedule (Q2980847) (← links)
- How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks (Q2980852) (← links)
- LBlock: A Lightweight Block Cipher (Q3011308) (← links)
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model (Q3013081) (← links)
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool (Q3013095) (← links)
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes (Q3013096) (← links)
- MJH: A Faster Alternative to MDC-2 (Q3073709) (← links)
- Results of Ukrainian national public cryptographic competition (Q3075865) (← links)
- Tweaking AES (Q3084255) (← links)
- Security Analysis of SIMD (Q3084266) (← links)
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal (Q3104710) (← links)
- Mars Attacks! Revisited: (Q3104728) (← links)
- Improving the Biclique Cryptanalysis of AES (Q3194588) (← links)
- A Domain Extender for the Ideal Cipher (Q3408200) (← links)
- Extracts from the SHA-3 Competition (Q3455489) (← links)
- Multi-key Security: The Even-Mansour Construction Revisited (Q3457111) (← links)
- Modeling Random Oracles Under Unpredictable Queries (Q4639493) (← links)
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications (Q4639496) (← links)
- On Integral Distinguishers of Rijndael Family of Ciphers (Q4912029) (← links)