Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
From MaRDI portal
Recommendations
Cited in
(37)- The number of impossible additive differentials for the composition of XOR and bit rotation
- Finding integral distinguishers with ease
- On the resilience of Even-Mansour to invariant permutations
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- A new algorithm for the unbalanced meet-in-the-middle problem
- Differential-linear cryptanalysis of round-reduced SPARX-64/128
- On additive differential probabilities of the composition of bitwise exclusive-or and a bit rotation
- XPX: generalized tweakable Even-Mansour with improved security guarantees
- Simpira v2: a family of efficient permutations using the AES round function
- Differential-linear approximation semi-unconstrained searching and partition tree: application to LEA and Speck
- scientific article; zbMATH DE number 2089135 (Why is no real title available?)
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Improved differential-linear attacks with applications to ARX ciphers
- Improved differential-linear attacks with applications to ARX ciphers
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \)
- Fully automated differential-linear attacks against ARX ciphers
- Public-seed pseudorandom permutations
- A bit-vector differential model for the modular addition by a constant
- A survey of elliptic curves for proof systems
- Key-Recovery Attacks Against the MAC Algorithm Chaskey
- Parallel verification of serial MAC and AE modes
- Another look at differential-linear attacks
- Post-quantum security of keyed sponge-based constructions through a modular approach
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- A MAC mode for lightweight block ciphers
- Post-quantum security of tweakable Even-Mansour, and applications
- Rotational cryptanalysis on MAC algorithm chaskey
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- On the XOR of multiple random permutations
- Additive differentials for ARX mappings with probability exceeding \(1/4\)
- Improved differential attack on round-reduced LEA
- The committing security of MACs with applications to generic composition
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
- Improved differential-linear attack with application to round-reduced Speck32/64
- Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks
This page was built for publication: Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2798625)