Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers (original) (raw)

Known-IV Attacks on Triple Modes of Operation of Block Ciphers

Jaechul Sung, 이옥연 (수학과)

Lecture Notes in Computer Science, 2001

View PDFchevron_right

On the Security of Double and 2-Key Triple Modes of Operation

Helena Handschuh

Lecture Notes in Computer Science, 1999

View PDFchevron_right

A New Type of Attacks on Block Ciphers

Boris Ryabko

Problems of Information Transmission, 2005

View PDFchevron_right

The Key-Dependent Attack on Block Ciphers

Xuejia Lai

Lecture Notes in Computer Science, 2009

View PDFchevron_right

The Security of ”One-Block-to-Many” Modes of Operation

Steve Babbage

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Attacks on single-pass confidentiality modes of operation

Olivier Markowitch

2014

View PDFchevron_right

On the Security of Double and 2-key Triple Modes of Operation (Published in L. Knudsen, Ed., Fast Software Encryption, vol. 1636 of Lecture Notes in Computer Science, pp. 215{230, Springer-Verlag, 1999.)

Helena Handschuh

2000

View PDFchevron_right

Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds

Jaechul Sung

View PDFchevron_right

Cryptanalysis of iterated block ciphers

Carlo Harpes

1996

View PDFchevron_right

New constructions in linear cryptanalysis of block ciphers

Zbigniew Kotulski

2000

View PDFchevron_right

The interpolation attack on block ciphers

Lars Knudsen

Lecture Notes in Computer Science, 1997

View PDFchevron_right

Multi-Stage Fault Attacks on Block Ciphers

Martin Kreuzer

2013

View PDFchevron_right

The Security of Elastic Block Ciphers Against Key-Recovery Attacks

Moti Yung

Lecture Notes in Computer Science, 2007

View PDFchevron_right

A New Meet-In-the-Middle Attack on the IDEA Block Cipher

Erkan Ture

Selected Areas in Cryptography, 2004

View PDFchevron_right

Message Authentication Codes from Unpredictable Block Ciphers

John Steinberger

Lecture Notes in Computer Science, 2009

View PDFchevron_right

A New Meet-In-the-Middle Attack on the IDEA Block Cipher, Proceedings of Selected Areas In Cryptography 2003

Erkan Ture

Lecture Notes in Computer Science

View PDFchevron_right

A general construction of tweakable block ciphers and different modes of operations

Debrup Chakraborty

Information Security and Cryptology, 2006

View PDFchevron_right

A Related Key Attack on the Feistel Type Block Ciphers

Javad Mohajeri

International Journal of Network Security, 2009

View PDFchevron_right

Key Classification Attack on Block Ciphers

Seyd Hassan Mousavi

View PDFchevron_right

Cryptanalysis of Block Ciphers with Overdefined Systems of Equations

Nicolas Courtois

Lecture Notes in Computer Science, 2002

View PDFchevron_right

New Directions in Cryptanalysis of Block Ciphers

Davood Rezaeipour

Journal of Computer Science, 2009

View PDFchevron_right

CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited

Nicolas Courtois

View PDFchevron_right

On the security of multiple encryption

Shaga Praveen

Communications of the ACM, 1981

View PDFchevron_right

Low-Data Complexity Attacks on AES

Vincent Rijmen

IEEE Transactions on Information Theory, 2000

View PDFchevron_right

Enhanced and authenticated cipher block chaining mode

beei iaes, Yousef AbuHour

Bulletin of Electrical Engineering and Informatics, 2023

View PDFchevron_right

Known-Key Distinguishers for Some Block Ciphers

Vincent Rijmen

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Cryptanalysis of block ciphers: A survey

Jean-jacques Quisquater

2003

View PDFchevron_right

Fault Template Attacks on Block Ciphers Exploiting Fault Propagation

Sayandeep Saha

Advances in Cryptology – EUROCRYPT 2020

View PDFchevron_right

Provable security of block ciphers against linear cryptanalysis: a mission impossible?

François-xavier Standaert

Designs, Codes and Cryptography, 2009

View PDFchevron_right

Security amplification by composition: The case of doubly-iterated, ideal ciphers

Giovanni Di Crescenzo

1998

View PDFchevron_right

PFX: An Essence of Authencryption for Block-Cipher Security

Austin Kipler

View PDFchevron_right

A Critical Analysis of Some Symmetric Key Block Cipher Algorithms

Sunil Mankotia, Manu Sood

View PDFchevron_right

Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3

Mohamed Tolba

Progress in Cryptology -- LATINCRYPT 2015, 2015

View PDFchevron_right

Modified forms of cipher block chaining

Chris Mitchell

Computers & Security, 1991

View PDFchevron_right

Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers

Sayandeep Saha

IACR Cryptol. ePrint Arch., 2019

View PDFchevron_right