Known-key distinguishing attack

Known as: Known key, Chosen key distinguisher, Chosen-key attack 
In cryptography, a known-key distinguishing attack is an attack model against symmetric ciphers, whereby an attacker who knows the key can find a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Known-key distinguishers have been introduced by Knudsen and Rijmen in 2007 to better understand the security of block ciphers in… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2015
2015
In this article, we analyse the known-key security of the standardized PRESENT lightweight block cipher. Namely, we propose a… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
3D block cipher is an AES-based block cipher which has a three-dimensional state. Besides some traditional attacks, Knudsen and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard cube attacks [4] find the key by solving… (More)
Is this relevant?
2010
2010
In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper we construct a chosen-key distinguisher and a related-key attack on the full 256-bit key AES. We define a notion of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
Knudsen and Rijmen introduced the notion of known-key distinguishers in an effort to view block cipher security from an… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2006
2006
Phelix is an asynchronous word-oriented stream cipher submitted to the ECRYPT stream cipher project, with a variable-length key… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
1994
Highly Cited
1994
In this paper we study the influence of key-scheduling algorithms on the strength of blockciphers. We show that the key… (More)
Is this relevant?