Skip to search formSkip to main contentSkip to account menu

Related-key attack

Known as: Related key, Related key attack, Related-key 
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This study considers a design problem in the supply chain network of an assembly manufacturing enterprise with economies of scale… 
2013
2013
We take a critical look at security models that are often used to give "provable security" guarantees. We pay particular… 
2011
2011
  • Fu ChuanL. Anqing
  • 2011
  • Corpus ID: 16141171
With the rapid increase of modern communication networks, the environmental problem has emerged. Reducing the emission of CO2 has… 
Highly Cited
2008
Highly Cited
2008
A recent framework for chosen IV statistical distinguishing analysis of stream ciphers is exploited and formalized to provide new… 
2008
2008
This paper introduces a new framework and a generalization of the various flavors of related-key attacks. The new framework… 
2008
2008
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related… 
2003
2003
IDEA is a 64-bit block cipher with a 128-bit key designed by J. Massey and X. Lai. At FSE 2002 a slightly modified version called… 
2002
2002
We formally introduce the concept of related-cipher attack. In this paper, we consider the related ciphers as block ciphers with… 
Highly Cited
2000
Highly Cited
2000
In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related… 
Review
1994
Review
1994
Highly flexible and survivable networks can be built by allocating optical carriers of heterodyne systems. The basic features of…