References
Demirci H, Selçuk A A. A meet-in-the-middle attack on 8-round AES. In: Fast Software Encyption. Berlin: Springer-Verlag, 2008. 116–126
Demirci H, Tąskin I, Çoban M, et al. Improved meet-in-the-middle attacks on AES. In: Proceedings of International Conference on Cryptology in India. Berlin: Springer-Verlag, 2009. 144–156
Dunkelman O, Keller N, Shamir A. Improved singlekey attacks on 8-round AES-192 and AES-256. In: Advances in Cryptology—ASIACRYPT 2010. Berlin: Springer-Verlag, 2010. 158–176
Derbez P, Fouque P A, Jean J. Improved key recovery attacks on reduced round AES in the single-key setting. In: Advances in Cryptology—EUROCRYPT 2013. Berlin: Springer-Verlag, 2013. 371–187
Li L B, Jia K T, Wang X Y. Improved single-key attacks on 9-round AES-192/256. In: Fast Software Encyption. Berlin: Springer-Verlag, 2015. 127–146
Li R J, Jin C H. Meet-in-the-middle attacks on 10-round AES-256. Designs Codes Cryptogr, 2015, 80: 459–471
Huang J L, Lai X J. Revisiting key schedule’s diffusion in relation with round function’s diffusion. Designs Codes Cryptogr, 2014, 73: 85–103
Li L, Wu W L, Zheng Y F. Automatic search for key-bridging technique: applications to LBlock and TWINE. In: Fast Software Encryption. Berlin: Springer-Verlag, 2016. 247–267
AlTawy R, Abdelkhalek A, Youssef A M. A meet-in-the-middle attack on reduced-round Kalyna-b/2b. Ieice Trans Inf Syst, 2016, E99.D: 1246–1250
Akshima, Chang D H, Ghosh M, et al. Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512. In: Information Security and Cryptology—ICISC 2015. Berlin: Springer-Verlag, 2015. 119–135
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61572125, 61373142), High Technology Field of “Action Plan for Scientific and Technological Innovation” in Shanghai (Grant No. 16511101400).
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors declare that they have no conflict of interest.
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Wang, G., Zhu, C. Single key recovery attacks on reduced AES-192 and Kalyna-128/256. Sci. China Inf. Sci. 60, 099101 (2017). https://doi.org/10.1007/s11432-016-0417-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-016-0417-7