Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: tweakey / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SIMON / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LED / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-020-00730-1 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3005554792 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Midori: A Block Cipher for Low Energy / rank
 
Normal rank
Property / cites work
 
Property / cites work: GIFT: A Small Present / rank
 
Normal rank
Property / cites work
 
Property / cites work: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Related-Key Rectangle Attack on the Full KASUMI / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046332 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Boomerang and Rectangle Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778856 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279560 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Cryptanalysis of the Full AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Boomerang Connectivity Table: a new cryptanalysis tool / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony / rank
 
Normal rank
Property / cites work
 
Property / cites work: The LED Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537984 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Software Performance of Authenticated-Encryption Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-key boomerang attacks on GIFT with automated trail search including BCT effect / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pushing the Limits: A Very Compact and a Threshold Implementation of AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Return of the Cryptographic Boomerang / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Impossible Differential Search Tool from Design and Cryptanalysis Aspects / rank
 
Normal rank
Property / cites work
 
Property / cites work: Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT / rank
 
Normal rank
Property / cites work
 
Property / cites work: On probability of success in linear and differential cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming the Demirci-Selçuk meet-in-the-middle attack with constraints / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible Differential Cryptanalysis of Reduced-Round SKINNY / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941810 / rank
 
Normal rank
Property / cites work
 
Property / cites work: MILP-based differential attack on round-reduced GIFT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Impossible-Differential Attack on Reduced-Round Skinny / rank
 
Normal rank

Latest revision as of 11:28, 4 December 2024

scientific article
Language Label Description Also known as
English
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
scientific article

    Statements

    Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    21 May 2020
    0 references
    key recovery
    0 references
    rectangle attack
    0 references
    SKINNY
    0 references
    SKINNY AEAD
    0 references
    GIFT
    0 references
    related-key
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers