Bicliques with Minimal Data and Time Complexity for AES
暂无分享,去创建一个
Andrey Bogdanov | Donghoon Chang | Somitra Kumar Sanadhya | Mohona Ghosh | A. Bogdanov | D. Chang | Mohona Ghosh | S. K. Sanadhya
[1] Gaëtan Leurent,et al. Narrow-Bicliques: Cryptanalysis of Full IDEA , 2012, EUROCRYPT.
[2] Takanori Isobe,et al. A Single-Key Attack on the Full GOST Block Cipher , 2011, Journal of Cryptology.
[3] Yu Sasaki,et al. Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.
[4] Ferhat Karakoç,et al. Biclique Cryptanalysis of TWINE , 2012, CANS.
[5] Anne Canteaut,et al. Sieve-in-the-Middle: Improved MITM Attacks (Full Version) , 2013, IACR Cryptol. ePrint Arch..
[6] Yu Sasaki,et al. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 , 2009, CRYPTO.
[7] Stefan Lucks,et al. Biclique Cryptanalysis Of PRESENT , LED , And KLEIN Revision 2013-0520 , 2013 .
[8] Roberto Maria Avanzi,et al. Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers , 2009, Selected Areas in Cryptography.
[9] Shao-zhen Chen,et al. Biclique Attack of the Full ARIA-256 , 2012, IACR Cryptol. ePrint Arch..
[10] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[11] Andrey Bogdanov,et al. Better than Brute-Force --- Optimized Hardware Architecture for Efficient Biclique Attacks on AES-128 , 2012 .
[12] Orr Dunkelman,et al. The effects of the omission of last round's MixColumns on AES , 2010, Inf. Process. Lett..
[13] Daesung Kwon,et al. Biclique Attack on the Full HIGHT , 2011, ICISC.
[14] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.
[15] Kenneth G. Paterson,et al. Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation , 2012, IACR Cryptol. ePrint Arch..
[16] Elisabeth Oswald,et al. A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework , 2011, CRYPTO.
[17] Pierre-Alain Fouque,et al. Automatic Search of Attacks on round-reduced AES and Applications , 2011, IACR Cryptol. ePrint Arch..
[18] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[19] Dmitry Khovratovich,et al. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family , 2012, IACR Cryptol. ePrint Arch..
[20] John P. Steinberger,et al. The preimage security of double-block-length compression functions , 2011, IACR Cryptol. ePrint Arch..
[21] Huaxiong Wang,et al. Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 , 2010, ASIACRYPT.
[22] Xiaoli Yu,et al. Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher , 2012, ISPEC.
[23] Yu Sasaki,et al. Preimage Attacks on One-Block MD4, 63-Step MD5 and More , 2009, Selected Areas in Cryptography.
[24] Moti Yung,et al. A New Randomness Extraction Paradigm for Hybrid Encryption , 2009, EUROCRYPT.
[25] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[26] Mark Manulis,et al. Cryptology and Network Security , 2012, Lecture Notes in Computer Science.
[27] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[28] David Chaum,et al. Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers , 1985, CRYPTO.
[29] Andrey Bogdanov,et al. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN , 2010, IACR Cryptol. ePrint Arch..
[30] Takanori Isobe. A Single-Key Attack on the Full GOST Block Cipher , 2011, FSE.
[31] Markus Kasper,et al. The World is Not Enough: Another Look on Second-Order DPA , 2010, IACR Cryptol. ePrint Arch..
[32] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[33] Stefan Lucks,et al. A Framework for Automated Independent-Biclique Cryptanalysis , 2013, FSE.
[34] Kyoji Shibutani,et al. Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo , 2012, ACISP.
[35] Hamid Mala. Biclique Cryptanalysis of the Block Cipher SQUARE , 2011, IACR Cryptol. ePrint Arch..