Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,111,654 papers from all fields of science
Search
Sign In
Create Free Account
Related-key attack
Known as:
Related key
, Related key attack
, Related-key
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Attack model
Block cipher
Boomerang attack
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Green Supply Chain Network Design with Economies of Scale and Environmental Concerns
Dezhi Zhang
,
Fan Zou
,
Shuangyan Li
,
Lingyun Zhou
2017
Corpus ID: 59418660
This study considers a design problem in the supply chain network of an assembly manufacturing enterprise with economies of scale…
Expand
2011
2011
Key techniques in green communication
Fu Chuan
,
L. Anqing
International Conference on Consumer Electronics…
2011
Corpus ID: 16141171
With the rapid increase of modern communication networks, the environmental problem has emerged. Reducing the emission of CO2 has…
Expand
2011
2011
Weak-Key Class of MISTY1 for Related-Key Differential Attack
Yibin Dai
,
Shao-zhen Chen
Conference on Information Security and Cryptology
2011
Corpus ID: 36649582
MISTY1 is a Feistel block cipher with presence in many cryptographic standards and applications. In this paper, according to…
Expand
2011
2011
Scheduling and monitoring of internally structured services in Cloud federations
L. Larsson
,
D. Henriksson
,
E. Elmroth
International Symposium on Computers and…
2011
Corpus ID: 2123175
Cloud infrastructure providers may form Cloud federations to cope with peaks in resource demand and to make large-scale service…
Expand
2010
2010
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
Jiazhe Chen
,
Keting Jia
Information Security Practice and Experience
2010
Corpus ID: 693377
Hash function Skein is one of the 14 NIST SHA-3 second round candidates. Threefish is a tweakable block cipher as the core of…
Expand
2008
2008
New Related-Key Boomerang Attacks on AES
M. Gorski
,
S. Lucks
International Conference on Cryptology in India
2008
Corpus ID: 34071371
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related…
Expand
2004
2004
Cost drivers and deployment scenarios for future broadband wireless networks - key research problems and directions for research
Tim Giles
,
Jan Markendahl
,
+4 authors
J. Nilsson
IEEE 59th Vehicular Technology Conference. VTC…
2004
Corpus ID: 33442587
The most prominent problem in providing anywhere, anytime wideband mobile access is the towering infrastructure cost as it is…
Expand
2003
2003
Cryptanalysis of IDEA-X/2
H. Raddum
Fast Software Encryption Workshop
2003
Corpus ID: 41761613
IDEA is a 64-bit block cipher with a 128-bit key designed by J. Massey and X. Lai. At FSE 2002 a slightly modified version called…
Expand
Highly Cited
2000
Highly Cited
2000
A Related-Key Cryptanalysis of RC4
Alexander Grosul
,
D. Wallach
2000
Corpus ID: 14507944
In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related…
Expand
Review
1994
Review
1994
Coherent multicarrier lightwave technology for flexible capacity networks
G. Khoe
IEEE Communications Magazine
1994
Corpus ID: 26737648
Highly flexible and survivable networks can be built by allocating optical carriers of heterodyne systems. The basic features of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE