Related-key attack

Known as: Related key, Related key attack, Related-key 
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1997-2017
010203019972017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Side-channel cryptanalysis is a very efficient class of attacks that recovers secret information by exploiting the physical… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2013
2013
Security against related-key attacks is an important criteria for modern cryptographic constructions. In the related-key setting… (More)
Is this relevant?
2013
2013
Due to the symmetric padding used in the stream cipher Grain v1 and Grain-128, it is possible to find Key-IV pairs that gener… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2012
2012
In this article we describe new generic distinguishing and forgery attacks in the related-key scenario (using only a single… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
In a related-key attack, an attacker seeks to discover the secret key by requesting encryptions under keys related to the secret… (More)
Is this relevant?
2011
2011
Triple encryption was proposed to increase the security of single encryption when the key is too short. In the past, there have… (More)
  • table I
  • table 2
  • figure 3
  • table 3
  • table 4
Is this relevant?
2010
2010
Over the last 20 years, the privacy of most GSM phone conversations was protected by the A5/1 and A5/2 stream ciphers, which were… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper we construct a chosen-key distinguisher and a related-key attack on the full 256-bit key AES. We define a notion of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
SHACAL-1 is a 160-bit block cipher with variable key length of up to 512-bit key based on the hash function SHA-1. It was… (More)
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the… (More)
Is this relevant?