Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,649,486 papers from all fields of science
Search
Sign In
Create Free Account
Related-key attack
Known as:
Related key
, Related key attack
, Related-key
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Attack model
Block cipher
Boomerang attack
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Green Supply Chain Network Design with Economies of Scale and Environmental Concerns
Dezhi Zhang
,
Fan Zou
,
Shuangyan Li
,
Lingyun Zhou
2017
Corpus ID: 59418660
This study considers a design problem in the supply chain network of an assembly manufacturing enterprise with economies of scale…
Expand
2013
2013
Another look at security definitions
N. Koblitz
,
A. Menezes
Advances in Mathematics of Communications
2013
Corpus ID: 19019347
We take a critical look at security models that are often used to give "provable security" guarantees. We pay particular…
Expand
2011
2011
Key techniques in green communication
Fu Chuan
,
L. Anqing
International Conference on Consumer Electronics…
2011
Corpus ID: 16141171
With the rapid increase of modern communication networks, the environmental problem has emerged. Reducing the emission of CO2 has…
Expand
Highly Cited
2008
Highly Cited
2008
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Simon Fischer
,
Shahram Khazaei
,
W. Meier
International Conference on Cryptology in Africa
2008
Corpus ID: 10896907
A recent framework for chosen IV statistical distinguishing analysis of stream ciphers is exploited and formalized to provide new…
Expand
2008
2008
A Unified Approach to Related-Key Attacks
E. Biham
,
O. Dunkelman
,
Nathan Keller
Fast Software Encryption Workshop
2008
Corpus ID: 17699646
This paper introduces a new framework and a generalization of the various flavors of related-key attacks. The new framework…
Expand
2008
2008
New Related-Key Boomerang Attacks on AES
M. Gorski
,
S. Lucks
International Conference on Cryptology in India
2008
Corpus ID: 34071371
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related…
Expand
2003
2003
Cryptanalysis of IDEA-X/2
H. Raddum
Fast Software Encryption Workshop
2003
Corpus ID: 41761613
IDEA is a 64-bit block cipher with a 128-bit key designed by J. Massey and X. Lai. At FSE 2002 a slightly modified version called…
Expand
2002
2002
Related-Cipher Attacks
Hongjun Wu
International Conference on Information…
2002
Corpus ID: 13229417
We formally introduce the concept of related-cipher attack. In this paper, we consider the related ciphers as block ciphers with…
Expand
Highly Cited
2000
Highly Cited
2000
A Related-Key Cryptanalysis of RC4
Alexander Grosul
,
D. Wallach
2000
Corpus ID: 14507944
In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related…
Expand
Review
1994
Review
1994
Coherent multicarrier lightwave technology for flexible capacity networks
G. Khoe
IEEE Communications Magazine
1994
Corpus ID: 26737648
Highly flexible and survivable networks can be built by allocating optical carriers of heterodyne systems. The basic features of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE