Pages that link to "Item:Q5385748"
From MaRDI portal
The following pages link to Related-Key Boomerang and Rectangle Attacks (Q5385748):
Displayed 35 items.
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (Q484333) (← links)
- Notions and relations for RKA-secure permutation and function families (Q540472) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- Improved (related-key) differential cryptanalysis on GIFT (Q832340) (← links)
- Related-key security for pseudorandom functions beyond the linear barrier (Q1994635) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 (Q2179384) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- New related-key rectangle attacks on reduced AES-192 and AES-256 (Q2267092) (← links)
- Critique of the related-key attack concept (Q2430685) (← links)
- Boomerang Attacks on Hash Function Using Auxiliary Differentials (Q2890006) (← links)
- Secure Message Authentication Against Related-Key Attack (Q2946884) (← links)
- Transposition of AES Key Schedule (Q2980847) (← links)
- Tweaking AES (Q3084255) (← links)
- Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes (Q3194586) (← links)
- Boomerang Attack on Step-Reduced SHA-512 (Q3454592) (← links)
- The Boomerang Attacks on the Round-Reduced Skein-512 (Q3455506) (← links)
- An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security (Q3457120) (← links)
- Cryptanalysis of Reduced-Round SMS4 Block Cipher (Q3511164) (← links)
- A Unified Approach to Related-Key Attacks (Q3525662) (← links)
- A Meet-in-the-Middle Attack on 8-Round AES (Q3525664) (← links)
- New Applications of Differential Bounds of the SDS Structure (Q3540157) (← links)
- Attacking 9 and 10 Rounds of AES-256 (Q3634483) (← links)
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT (Q3634486) (← links)
- (Q5147370) (← links)
- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 (Q5385513) (← links)
- The Delicate Issues of Addition with Respect to XOR Differences (Q5452258) (← links)
- Related-Key Differential-Linear Attacks on Reduced AES-192 (Q5458202) (← links)
- New Related-Key Boomerang Attacks on AES (Q5504629) (← links)
- Reflection Cryptanalysis of Some Ciphers (Q5504631) (← links)
- Key structures: improved related-key boomerang attack against the full AES-256 (Q6108767) (← links)
- On the related-key attack security of authenticated encryption schemes (Q6134826) (← links)
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} (Q6135400) (← links)
- Differential meet-in-the-middle cryptanalysis (Q6145947) (← links)
- Automatic boomerang attacks search on Rijndael (Q6193391) (← links)