Skip to search formSkip to main contentSkip to account menu

Related-key attack

Known as: Related key, Related key attack, Related-key 
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This study considers a design problem in the supply chain network of an assembly manufacturing enterprise with economies of scale… 
2011
2011
  • Fu ChuanL. Anqing
  • 2011
  • Corpus ID: 16141171
With the rapid increase of modern communication networks, the environmental problem has emerged. Reducing the emission of CO2 has… 
2011
2011
MISTY1 is a Feistel block cipher with presence in many cryptographic standards and applications. In this paper, according to… 
2011
2011
Cloud infrastructure providers may form Cloud federations to cope with peaks in resource demand and to make large-scale service… 
2010
2010
Hash function Skein is one of the 14 NIST SHA-3 second round candidates. Threefish is a tweakable block cipher as the core of… 
2008
2008
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related… 
2004
2004
The most prominent problem in providing anywhere, anytime wideband mobile access is the towering infrastructure cost as it is… 
2003
2003
IDEA is a 64-bit block cipher with a 128-bit key designed by J. Massey and X. Lai. At FSE 2002 a slightly modified version called… 
Highly Cited
2000
Highly Cited
2000
In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related… 
Review
1994
Review
1994
Highly flexible and survivable networks can be built by allocating optical carriers of heterodyne systems. The basic features of…