A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
DOI10.1007/S10623-021-00984-3zbMATH Open1485.94077OpenAlexW4206242425WikidataQ114849839 ScholiaQ114849839MaRDI QIDQ2115734FDOQ2115734
Santu Pal, Santanu Sarkar, Deepak Kumar Dalai
Publication date: 21 March 2022
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-021-00984-3
Recommendations
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Some results on lightweight stream ciphers Fountain v1 \& lizard
- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
- scientific article; zbMATH DE number 2089140
- An improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators
Graphs and linear algebra (matrices, eigenvalues, etc.) (05C50) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Linear algebra (educational aspects) (97H60)
Cites Work
- A Chosen IV Related Key Attack on Grain-128a
- Title not available (Why is that?)
- A cryptanalytic time-memory trade-off
- Title not available (Why is that?)
- Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
- A TMDTO Attack Against Lizard
- Two generic methods of analyzing stream ciphers
- A Differential Fault Attack on Grain-128a Using MACs
- A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers
- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
Cited In (2)
Uses Software
This page was built for publication: A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2115734)