Key-recovery attack

Known as: Key recovery attack 
A key-recovery attack is an adversary's attempt to recover the cryptographic key of an encryption scheme. Historically, cryptanalysis of block… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Post-quantum cryptography has drawn considerable attention from cryptologists on a global scale. At Asiacrypt 2017, Leander and… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
2016
2016
MANTIS is a lightweight tweakable block cipher published at CRYPTO 2016. In addition to the full 14-round version, MANTIS7, the… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 3
Is this relevant?
2014
2014
Wheesht is one of the candidates to the CAESAR competition. In this note we present several attacks on Wheesht, showing that it… (More)
Is this relevant?
2012
2012
In this paper, we present a key-recovery attack on the online authenticated encryption scheme McOE-X proposed by Fleischmann et… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
A recent framework for chosen IV statistical distinguishing analysis of stream ciphers is exploited and formalized to provide new… (More)
Is this relevant?
2007
2007
Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained… (More)
  • figure 2
  • figure 4
  • table 1
  • table 2
  • table 3
Is this relevant?
2007
2007
In this paper, we consider how an unknown constant within a state update function or output function a ects biases of linear… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
2004
2004
In this paper new “partial” key recovery attacks against the RMAC block cipher based Message Authentication Code scheme are… (More)
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks… (More)
  • figure 1
  • figure 2
Is this relevant?