Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers (original) (raw)
Related papers
Known-IV Attacks on Triple Modes of Operation of Block Ciphers
Lecture Notes in Computer Science, 2001
On the Security of Double and 2-Key Triple Modes of Operation
Lecture Notes in Computer Science, 1999
A New Type of Attacks on Block Ciphers
Problems of Information Transmission, 2005
The Key-Dependent Attack on Block Ciphers
Lecture Notes in Computer Science, 2009
The Security of ”One-Block-to-Many” Modes of Operation
Lecture Notes in Computer Science, 2003
Attacks on single-pass confidentiality modes of operation
2014
2000
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds
Cryptanalysis of iterated block ciphers
1996
New constructions in linear cryptanalysis of block ciphers
2000
The interpolation attack on block ciphers
Lecture Notes in Computer Science, 1997
Multi-Stage Fault Attacks on Block Ciphers
2013
The Security of Elastic Block Ciphers Against Key-Recovery Attacks
Lecture Notes in Computer Science, 2007
A New Meet-In-the-Middle Attack on the IDEA Block Cipher
Selected Areas in Cryptography, 2004
Message Authentication Codes from Unpredictable Block Ciphers
Lecture Notes in Computer Science, 2009
Lecture Notes in Computer Science
A general construction of tweakable block ciphers and different modes of operations
Information Security and Cryptology, 2006
A Related Key Attack on the Feistel Type Block Ciphers
International Journal of Network Security, 2009
Key Classification Attack on Block Ciphers
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Lecture Notes in Computer Science, 2002
New Directions in Cryptanalysis of Block Ciphers
Journal of Computer Science, 2009
CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
On the security of multiple encryption
Communications of the ACM, 1981
Low-Data Complexity Attacks on AES
IEEE Transactions on Information Theory, 2000
Enhanced and authenticated cipher block chaining mode
Bulletin of Electrical Engineering and Informatics, 2023
Known-Key Distinguishers for Some Block Ciphers
Lecture Notes in Computer Science, 2007
Cryptanalysis of block ciphers: A survey
2003
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
Advances in Cryptology – EUROCRYPT 2020
Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Designs, Codes and Cryptography, 2009
Security amplification by composition: The case of doubly-iterated, ideal ciphers
1998
PFX: An Essence of Authencryption for Block-Cipher Security
A Critical Analysis of Some Symmetric Key Block Cipher Algorithms
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
Progress in Cryptology -- LATINCRYPT 2015, 2015
Modified forms of cipher block chaining
Computers & Security, 1991
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
IACR Cryptol. ePrint Arch., 2019