Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY
暂无分享,去创建一个
Siwei Sun | Danping Shi | Ling Song | Qianqian Yang | Lei Hu
[1] Orr Dunkelman,et al. Biased differential distinguisher - Cryptanalysis of reduced-round SKINNY , 2021, Inf. Comput..
[2] Qiu Chen,et al. Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging , 2019, ICICS.
[3] Yosuke Todo,et al. Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion , 2019, IACR Cryptol. ePrint Arch..
[4] Chenhui Jin,et al. Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC , 2019, IET Inf. Secur..
[5] Lei Hu,et al. Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints , 2018, IACR Cryptol. ePrint Arch..
[6] Dong Yang,et al. Impossible differential attacks on the SKINNY family of block ciphers , 2017, IET Inf. Secur..
[7] Amr M. Youssef,et al. Impossible Differential Cryptanalysis of Reduced-Round SKINNY , 2017, AFRICACRYPT.
[8] Chenhui Jin,et al. Meet-in-the-middle attacks on 10-round AES-256 , 2016, Des. Codes Cryptogr..
[9] Pierre-Alain Fouque,et al. Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks , 2016, CRYPTO.
[10] Thomas Peyrin,et al. The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS , 2016, IACR Cryptol. ePrint Arch..
[11] A. Shamir,et al. Improved Single-Key Attacks on 8-Round AES-192 and AES-256 , 2015, Journal of Cryptology.
[12] Keting Jia,et al. Improved Single-Key Attacks on 9-Round AES-192/256 , 2014, FSE.
[13] Li Lin,et al. General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher , 2013, ICISC.
[14] Jérémy Jean,et al. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting , 2013, IACR Cryptol. ePrint Arch..
[15] Pierre-Alain Fouque,et al. Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES , 2013, IACR Cryptol. ePrint Arch..
[16] Hüseyin Demirci,et al. Improved Meet-in-the-Middle Attacks on AES , 2009, INDOCRYPT.
[17] Ali Aydin Selçuk,et al. A Meet-in-the-Middle Attack on 8-Round AES , 2008, FSE.
[18] Maria Eichlseder,et al. Finding the Impossible: Automated Search for Full Impossible Differential, Zero-Correlation, and Integral Attacks , 2022, IACR Cryptol. ePrint Arch..
[19] Jian Guo,et al. Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing , 2022, CRYPTO.
[20] Maria Eichlseder,et al. Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges , 2021, IACR Cryptol. ePrint Arch..
[21] Lei Hu,et al. Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks , 2021, CRYPTO.
[22] Joan Daemen,et al. The Design of Rijndael: The Advanced Encryption Standard (AES) , 2020, Information Security and Cryptography.