Loading…
Biclique cryptanalysis using balanced complete bipartite subgraphs
Dear editor,At Asiacrypt 2011,Bogdanov et al.[1]formally defined the biclique cryptanalysis method and proposed the first key recovery attack on full-round AES faster than exhaustible search in single-key model.The basic idea underlying the biclique cryptanalysis is to determine two independent(or i...
Saved in:
Published in: | Science China. Information sciences 2016-04, Vol.59 (4), p.204-206, Article 049101 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Dear editor,At Asiacrypt 2011,Bogdanov et al.[1]formally defined the biclique cryptanalysis method and proposed the first key recovery attack on full-round AES faster than exhaustible search in single-key model.The basic idea underlying the biclique cryptanalysis is to determine two independent(or interleaving)differential paths in the forward and the backward direction to construct a biclique for a |
---|---|
ISSN: | 1674-733X 1869-1919 |
DOI: | 10.1007/s11432-016-5540-x |