Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC
From MaRDI portal
Publication:2032168
DOI10.1016/J.IPL.2021.106124OpenAlexW3154320256MaRDI QIDQ2032168
Meiqin Wang, Shiyao Chen, Zishen Zhao, Wei Wang
Publication date: 16 June 2021
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2021.106124
Uses Software
Cites Work
- Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}
- New MILP modeling: improved conditional cube attacks on KECCAK-based constructions
- Improved conditional cube attacks on Keccak keyed modes with MILP method
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Rotational Cryptanalysis of Round-Reduced Keccak
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Breaking Grain-128 with Dynamic Cube Attacks
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Cube Attacks on Tweakable Black Box Polynomials
- Unaligned Rebound Attack: Application to Keccak
- New Attacks on Keccak-224 and Keccak-256
- New Collision Attacks on Round-Reduced Keccak
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
This page was built for publication: Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC