云题海 - 专业文章范例文档资料分享平台

当前位置:首页 > General Model of the SingleKey Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher

General Model of the SingleKey Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher

  • 62 次阅读
  • 3 次下载
  • 2025/5/31 8:49:56

GeneralModeloftheSingle-KeyMeet-in-the-MiddleDistinguisher223

References

1.Bouillaguet,C.,Derbez,P.,Fouque,P.-A.:Automaticsearchofattacksonround-reducedaesandapplications.In:Rogaway,P.(ed.)CRYPTO2011.LNCS,vol.6841,pp.169–187.Springer,Heidelberg(2011)

2.Cheon,J.H.,Kim,M.J.,Kim,K.,Lee,J.-Y.,Kang,S.W.:Improvedimpossibledi?erentialcryptanalysisofrijndaelandcrypton.In:Kim,K.(ed.)ICISC2001.LNCS,vol.2288,pp.39–49.Springer,Heidelberg(2002)

3.Daemen,J.,Knudsen,L.R.,Rijmen,V.:TheblockcipherSquare.In:Biham,E.(ed.)FSE1997.LNCS,vol.1267,pp.149–165.Springer,Heidelberg(1997)

4.Daemen,J.,Rijmen,V.:Aesproposal:Rijndael.In:FirstAdvancedEncryptionStandard(AES)Conference(1998)

5.Daemen,J.,Rijmen,V.:TheDesignofRijndael:AES-theAdvancedEncryptionStandard.Springer,Berlin(2002)6.Demirci,H.,Sel?cuk,A.A.:Ameet-in-the-middleattackon8-roundAES.In:Nyberg,K.(ed.)FSE2008.LNCS,vol.5086,pp.116–126.Springer,Heidelberg(2008)

7.Derbez,P.,Fouque,P.-A.:ExhaustingDemirci-Sel?cukMeet-in-the-MiddleAttacksAgainstReduced-RoundAES.In:Moriai,S.(ed.)FSE2013.LNCS,vol.2013,pp.541–560.Springer,Heidelberg(2013)

8.Derbez,P.,Fouque,P.-A.,Jean,J.:Improvedkeyrecoveryattacksonreduced-roundAESinthesingle-keysetting.In:Johansson,T.,Nguyen,P.Q.(eds.)EURO-CRYPT2013.LNCS,vol.7881,pp.371–387.Springer,Heidelberg(2013)

9.Dunkelman,O.,Keller,N.,Shamir,A.:Improvedsingle-keyattackson8-roundAES-192andAES-256.In:Abe,M.(ed.)ASIACRYPT2010.LNCS,vol.6477,pp.158–176.Springer,Heidelberg(2010)

10.Fouque,P.-A.,Jean,J.,Peyrin,T.:StructuralevaluationofAESandchosen-key

distinguisherof9-roundAES-128.In:Canetti,R.,Garay,J.A.(eds.)CRYPTO2013,PartI.LNCS,vol.8042,pp.183–203.Springer,Heidelberg(2013)

11.Gilbert,H.,Minier,M.:ACollisionsSttackonthe7-RoundsRijndael(2000)12.Lim,C.H.:Crypton:ANew128-bitBlockCipher.NIsTAEsProposal(1998)13.Lim,C.H.:ArevisedversionofCRYPTON-CRYPTONV1.0.In:Knudsen,L.R.

(ed.)FSE1999.LNCS,vol.1636,p.31.Springer,Heidelberg(1999)

14.Lim,C.H.,Korkishko,T.:mCrypton–alightweightblockcipherforsecurityof

low-costRFIDtagsandsensors.In:Song,J.-S.,Kwon,T.,Yung,M.(eds.)WISA2005.LNCS,vol.3786,pp.243–258.Springer,Heidelberg(2006)

15.Mala,H.,Shakiba,M.,Dakhilalian,M.:Newimpossibledi?erentialattackson

reduced-roundcrypton.Comput.Stand.Interface32(4),222–227(2010)

16.Wu,W.,Zhang,L.:LBlock:alightweightblockcipher.In:Lopez,J.,Tsudik,G.

(eds.)ACNS2011.LNCS,vol.6715,pp.327–344.Springer,Heidelberg(2011)

搜索更多关于: General Model of the SingleKey 的文档
  • 收藏
  • 违规举报
  • 版权认领
下载文档10.00 元 加入VIP免费下载
推荐下载
本文作者:...

共分享92篇相关文档

文档简介:

GeneralModeloftheSingle-KeyMeet-in-the-MiddleDistinguisher223References1.Bouillaguet,C.,Derbez,P.,Fouque,P.-A.:Automaticsearchofattacksonround-reducedaesandapplications.In:Rogaway,P.(ed.)CRYPTO2011.LNCS,vol.6841,pp.169–187.Springer,Heidelberg(2011)2.Cheon,J.H.,Kim,M.J.,Kim,K.,Lee,J.-Y.,Kang,S.W.:Improvedimpossibledi?erentialcryptanalysisofrijndaelandcrypton.In:Kim,K.(ed.)IC

× 游客快捷下载通道(下载后可以自由复制和排版)
单篇付费下载
限时特价:10 元/份 原价:20元
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219
Copyright © 云题海 All Rights Reserved. 苏ICP备16052595号-3 网站地图 客服QQ:370150219 邮箱:370150219@qq.com