Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode
From MaRDI portal
Publication:2229266
DOI10.1007/978-3-030-57808-4_5OpenAlexW3082208189MaRDI QIDQ2229266
Yu Sasaki, Hirotaka Yoshida, Shouichi Hirose
Publication date: 23 February 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-57808-4_5
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Authenticated encryption with nonce misuse and physical leakage: definitions, separation results and first construction (extended abstract)
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW
- Another Look at Complementation Properties
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Boosting Merkle-Damgård Hashing for Message Authentication
- Impact of Rotations in SHA-1 and Related Hash Functions
- Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy
This page was built for publication: Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode