Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} (Q6135400): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by the same user not shown)
Property / cites work
 
Property / cites work: MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphers for MPC and FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimage Attacks on One-Block MD4, 63-Step MD5 and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: GIFT: A Small Present / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic search of meet-in-the-middle preimage attacks on AES-like hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Uniform first-order threshold implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Cryptanalytic Results on IDEA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046332 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778856 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Boomerang and Rectangle Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Cryptanalysis of the Full AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sieve-in-the-Middle: Improved MITM Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Boomerang Connectivity Table: a new cryptanalysis tool / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key guessing strategies for linear key-schedule algorithms in rectangle attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: A practical forgery attack on Lilliput-AE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Single-Key Attacks on 8-Round AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony / rank
 
Normal rank
Property / cites work
 
Property / cites work: Match Box Meet-in-the-Middle Attack Against KATAN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing TI-friendly substitution boxes using shift-invariant permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Single-Key Attack on the Full GOST Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537984 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond birthday bound secure fresh rekeying: application to authenticated encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lightweight authenticated encryption mode suitable for threshold implementation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secret can be public: low-memory AEAD mode for high-order masking / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold Implementations Against Side-Channel Attacks and Glitches / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3407081 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Preimages in Full MD5 Faster Than Exhaustive Search / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simplified MITM modeling for permutations: new (quantum) attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible Differential Cryptanalysis of Reduced-Round SKINNY / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941810 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Impossible-Differential Attack on Reduced-Round Skinny / rank
 
Normal rank

Latest revision as of 13:01, 4 December 2024

scientific article; zbMATH DE number 7731519
Language Label Description Also known as
English
Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
scientific article; zbMATH DE number 7731519

    Statements

    Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    25 August 2023
    0 references
    SKINNY
    0 references
    TWEAKEY
    0 references
    rectangle
    0 references
    meet-in-the-middle
    0 references
    impossible differential
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers