Related-key attack

Results: 34



#Item
1Data Encryption Standard / Key schedule / Weak key / Block cipher / GOST / Differential cryptanalysis / Blowfish / Khufu and Khafre / RC5 / Related-key attack / ICE / Cryptanalysis

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
2

Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version) Alex Biryukov, Dmitry Khovratovich, Ivica Nikoli“c University of Luxembourg {alex.biryukov, dmitry.khovratovich, }

Add to Reading List

Source URL: www.cryptolux.org

Language: English - Date: 2013-09-17 06:26:54
    3RC4 / Keystream / ICE / Related-key attack / Cryptography / Stream ciphers / Py

    Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-02-22 22:33:26
    4RC4 / Related-key attack / Random variable / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

    A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4 is the most widely deployed

    Add to Reading List

    Source URL: saluc.engr.uconn.edu

    Language: English - Date: 2006-02-21 13:57:34
    5Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Related-key attack / ICE / Weak key / Permutation / Initialization vector / Cryptography / Stream ciphers / RC4

    Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 2

    Add to Reading List

    Source URL: saluc.engr.uconn.edu

    Language: English - Date: 2006-02-21 14:40:46
    6Linear cryptanalysis / Key schedule / Advanced Encryption Standard / Block ciphers / MacGuffin / Differential-linear attack / Cryptography / Differential cryptanalysis / ICE

    Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan1,2 , Lei Hu1,2 , Ling Song1,2 , Siwei Sun1,2 , and Xiaoshuang Ma1,2 1 State Key Laboratory of Information Security, Institute of Information Eng

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-12-10 22:05:20
    7Slide attack / ICE / Linear cryptanalysis / Symmetric-key algorithm / SEED / Related-key attack / Block ciphers / Weak key / Data Encryption Standard / Cryptography / Key schedule / Differential cryptanalysis

    SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

    Add to Reading List

    Source URL: seed.kisa.or.kr

    Language: English
    8Advanced Encryption Standard / Key management / Triple DES / Tiny Encryption Algorithm / Key size / Blowfish / Related-key attack / Ciphertext / International Data Encryption Algorithm / Cryptography / Block ciphers / Data Encryption Standard

    Key-Schedule Cryptanalysis of DEAL John Kelsey and Bruce Schneier Counterpane Systems {kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy Minneapolis, MN 55419

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:30
    UPDATE