Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
暂无分享,去创建一个
[1] Vincent Rijmen,et al. Improved Impossible Differential Cryptanalysis of 7-Round AES-128 , 2010, INDOCRYPT.
[2] Bruce Schneier,et al. Improved Cryptanalysis of Rijndael , 2000, FSE.
[3] Eli Biham,et al. New Results on Boomerang and Rectangle Attacks , 2002, FSE.
[4] Florian Mendel,et al. Square Attack on 7-Round Kiasu-BC , 2016, IACR Cryptol. ePrint Arch..
[5] Yu Sasaki,et al. Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.
[6] Amr M. Youssef,et al. A Meet in the Middle Attack on Reduced Round Kiasu-BC , 2016, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[7] Behnam Bahrak,et al. Impossible differential attack on seven-round AES-128 , 2008, IET Inf. Secur..
[8] Andrey Bogdanov,et al. Better than Brute-Force --- Optimized Hardware Architecture for Efficient Biclique Attacks on AES-128 , 2012 .
[9] Vincent Rijmen,et al. Understanding Two-Round Differentials in AES , 2006, SCN.
[10] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[11] David A. Wagner,et al. Tweakable Block Ciphers , 2002, Journal of Cryptology.
[12] Phillip Rogaway,et al. The Software Performance of Authenticated-Encryption Modes , 2011, FSE.
[13] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[14] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[15] Anne Canteaut,et al. Sieve-in-the-Middle: Improved MITM Attacks (Full Version) , 2013, IACR Cryptol. ePrint Arch..
[16] Jérémy Jean,et al. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting , 2013, IACR Cryptol. ePrint Arch..
[17] Sean Murphy,et al. The Return of the Cryptographic Boomerang , 2011, IEEE Transactions on Information Theory.
[18] Bruce Schneier,et al. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent , 2000, FSE.
[19] Yu Sasaki,et al. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 , 2009, CRYPTO.
[20] Thomas Peyrin,et al. Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers , 2016, CRYPTO.
[21] Andrey Bogdanov,et al. Bicliques with Minimal Data and Time Complexity for AES , 2014, ICISC.
[22] Kazuhiko Minematsu,et al. Building blockcipher from small-block tweakable blockcipher , 2015, Des. Codes Cryptogr..
[23] María Naya-Plasencia,et al. Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version) , 2014, IACR Cryptol. ePrint Arch..
[24] Stefan Lucks,et al. The Skein Hash Function Family , 2009 .
[25] Eli Biham,et al. The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.
[26] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[27] Jongsung Kim,et al. New Impossible Differential Attacks on AES , 2008, INDOCRYPT.
[28] Thomas Peyrin,et al. Tweaks and Keys for Block Ciphers: The TWEAKEY Framework , 2014, ASIACRYPT.
[29] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[30] Dmitry Khovratovich,et al. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family , 2012, IACR Cryptol. ePrint Arch..
[31] Yusuke Naito,et al. Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher , 2015, ProvSec.
[32] Yu Sasaki,et al. Preimage Attacks on One-Block MD4, 63-Step MD5 and More , 2009, Selected Areas in Cryptography.