Revisiting AES Related-Key Differential Attacks with Constraint Programming
暂无分享,去创建一个
Marine Minier | Christine Solnon | Pascal Lafourcade | David Gérault | M. Minier | Christine Solnon | David Gérault | P. Lafourcade
[1] Eli Biham,et al. Differential Cryptanalysis of Feal and N-Hash , 1991, EUROCRYPT.
[2] Eli Biham,et al. New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract) , 1994, EUROCRYPT.
[3] Vincent Rijmen,et al. Known-Key Distinguishers for Some Block Ciphers , 2007, ASIACRYPT.
[4] Ivica Nicolic. Cryptanalysis and design of symmetric primitives , 2011 .
[5] Alex Biryukov,et al. Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others , 2010, EUROCRYPT.
[6] Marine Minier,et al. Constraint Programming Models for Chosen Key Differential Cryptanalysis , 2016, CP.
[7] Thomas Peyrin,et al. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 , 2013, CRYPTO.
[8] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[9] Alex Biryukov,et al. Distinguisher and Related-Key Attack on the Full AES-256 , 2009, CRYPTO.
[10] Jongsung Kim,et al. Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 , 2007, FSE.