Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds

A Biryukov, O Dunkelman, N Keller… - Advances in Cryptology …, 2010 - Springer
… type of security margin in AES is significantly smaller than … key derivation attacks of practical
complexity on AES-256 when its number of rounds is reduced to approximately that of AES-…

Key recovery attacks of practical complexity on AES variants with up to 10 rounds

A Biryukov, O Dunkelman, N Keller… - Cryptology ePrint …, 2009 - eprint.iacr.org
… , and do not seem to pose any real threat to the security of AES-based systems. In this …
attacks which can break with practical complexity variants of AES-256 whose number of rounds

Improved key recovery attacks on reduced-round AES with practical data and memory complexities

A Bar-On, O Dunkelman, N Keller, E Ronen… - Journal of …, 2020 - Springer
… to larger versions of AES, we obtain new attacks on AES-192 and AES-256 which … complexity
among all the attacks on 7-round AES which have practical data and memory complexities. …

Improved key recovery attacks on reduced-round AES in the single-key setting

P Derbez, PA Fouque, J Jean - … in Cryptology–EUROCRYPT 2013: 32nd …, 2013 - Springer
… We present the best attack on 7 rounds of AES-128 where data/time/memory complexities
are … This gives the best attacks on those two versions with a data complexity of 2 107 chosen-…

Key Recovery Attack Against 2.5-Round-Cipher

C Boura, A Chakraborti, G Leurent, G Paul… - … Conference on Fast …, 2016 - Springer
… a key recovery attack with time complexity little higher than \(2^{4\omega }\), and low data
complexity, against variants … that offer perceptible advantages over AES-GCM and that can be …

Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ

D Saha, S Kakarla, S Mandava… - Journal of Hardware and …, 2017 - Springer
practical key-recovery attacks on round-reduced variants of … the Round 2 candidates of
CAESAR is PAEQ which is an AES … Further, we show that the complexity of the entire attack can …

Low-data complexity attacks on AES

C Bouillaguet, P Derbez, O Dunkelman… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
… This approach allows to achieve practical complexities even … are based on a variant of our
attack against 4-round AES with two … known attack on AES-192 and AES-256 in the single key

Improved single-key attacks on 9-round AES-192/256

L Li, K Jia, X Wang - International Workshop on Fast Software Encryption, 2014 - Springer
… , and now may be the most efficient attack on all versions of AES [9]. The meet-in-the-middle …
The time complexity of the attack in this paper is measured with the unit of an equivalent …

Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ

D Saha, S Kakarla, S Mandava… - … Conference on Security …, 2016 - Springer
practical key-recovery attacks on round-reduced variants of … the Round 2 candidates of
CAESAR is PAEQ which is an AES … Further, we show that the complexity of the entire attack can …

Improved single-key attacks on 8-round AES-192 and AES-256

O Dunkelman, N Keller, A Shamir - Journal of Cryptology, 2015 - Springer
key attacks requiring practical time complexity of 2 45 were found on … attacks on reduced-round
AES, and analyze their complexity. In Sect… We use AES to mean all three variants of AES. …