Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY

[1]  Orr Dunkelman,et al.  Biased differential distinguisher - Cryptanalysis of reduced-round SKINNY , 2021, Inf. Comput..

[2]  Qiu Chen,et al.  Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging , 2019, ICICS.

[3]  Yosuke Todo,et al.  Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion , 2019, IACR Cryptol. ePrint Arch..

[4]  Chenhui Jin,et al.  Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC , 2019, IET Inf. Secur..

[5]  Lei Hu,et al.  Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints , 2018, IACR Cryptol. ePrint Arch..

[6]  Dong Yang,et al.  Impossible differential attacks on the SKINNY family of block ciphers , 2017, IET Inf. Secur..

[7]  Amr M. Youssef,et al.  Impossible Differential Cryptanalysis of Reduced-Round SKINNY , 2017, AFRICACRYPT.

[8]  Chenhui Jin,et al.  Meet-in-the-middle attacks on 10-round AES-256 , 2016, Des. Codes Cryptogr..

[9]  Pierre-Alain Fouque,et al.  Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks , 2016, CRYPTO.

[10]  Thomas Peyrin,et al.  The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS , 2016, IACR Cryptol. ePrint Arch..

[11]  A. Shamir,et al.  Improved Single-Key Attacks on 8-Round AES-192 and AES-256 , 2015, Journal of Cryptology.

[12]  Keting Jia,et al.  Improved Single-Key Attacks on 9-Round AES-192/256 , 2014, FSE.

[13]  Li Lin,et al.  General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher , 2013, ICISC.

[14]  Jérémy Jean,et al.  Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting , 2013, IACR Cryptol. ePrint Arch..

[15]  Pierre-Alain Fouque,et al.  Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES , 2013, IACR Cryptol. ePrint Arch..

[16]  Hüseyin Demirci,et al.  Improved Meet-in-the-Middle Attacks on AES , 2009, INDOCRYPT.

[17]  Ali Aydin Selçuk,et al.  A Meet-in-the-Middle Attack on 8-Round AES , 2008, FSE.

[18]  Maria Eichlseder,et al.  Finding the Impossible: Automated Search for Full Impossible Differential, Zero-Correlation, and Integral Attacks , 2022, IACR Cryptol. ePrint Arch..

[19]  Jian Guo,et al.  Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing , 2022, CRYPTO.

[20]  Maria Eichlseder,et al.  Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges , 2021, IACR Cryptol. ePrint Arch..

[21]  Lei Hu,et al.  Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks , 2021, CRYPTO.

[22]  Joan Daemen,et al.  The Design of Rijndael: The Advanced Encryption Standard (AES) , 2020, Information Security and Cryptography.