Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
From MaRDI portal
Publication:2102070
DOI10.1007/978-3-030-56877-1_13zbMATH Open1504.94132OpenAlexW3048511689MaRDI QIDQ2102070FDOQ2102070
Authors: Patrick Derbez, Paul Huynh, Virginie Lallemand, María Naya-Plasencia, Léo Perrin, André Schrottenloher
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_13
Recommendations
- Cryptanalysis of full sprout
- Cryptanalysis of full \texttt{RIPEMD-128}
- Differential cryptanalysis of round-reduced \textsc{Sparx}-64/128
- Cryptanalysis of the full Spritz stream cipher
- Information Security and Privacy
- New insights on AES-like SPN ciphers
- New Results in Linear Cryptanalysis of RC5
- Side channel analysis of SPARX-64/128: cryptanalysis and countermeasures
- Integral cryptanalysis on full MISTY1
- Integral cryptanalysis on full MISTY1
distinguisherdifferential attacksforgeryround constantsdedicated cryptanalysisimplemented attackslightweight primitivesspook
Cites Work
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- LEA
- PRESENT: An Ultra-Lightweight Block Cipher
- Title not available (Why is that?)
- Title not available (Why is that?)
- Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- LS-designs: bitslice encryption for efficient masked software implementations
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- \texttt{Midori}: a block cipher for low energy
Cited In (3)
Uses Software
This page was built for publication: Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2102070)