Cryptanalysis of Ascon
From MaRDI portal
Publication:2790053
DOI10.1007/978-3-319-16715-2_20zbMath1382.94096OpenAlexW1907010521MaRDI QIDQ2790053
Christoph Dobraunig, Florian Mendel, Maria Eichlseder, Martin Schläffer
Publication date: 2 March 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16715-2_20
Related Items (17)
Differential-linear cryptanalysis from an algebraic perspective ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ Nonce-misuse security of the SAEF authenticated encryption mode ⋮ Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT ⋮ sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices ⋮ Differential-linear cryptanalysis revisited ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Differential and linear properties of vectorial Boolean functions based on chi ⋮ DEFAULT: cipher level resistance against differential fault attack ⋮ Designing tweakable enciphering schemes using public permutations ⋮ Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting ⋮ Hold your breath, PRIMATEs are lightweight ⋮ Conditional Cube Attack on Reduced-Round Keccak Sponge Function ⋮ \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ Automatic verification of differential characteristics: application to reduced Gimli
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes
- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
- Higher-Order Differential Properties of Keccak and Luffa
- Cube Attacks on Tweakable Black Box Polynomials
- Enhancing Differential-Linear Cryptanalysis
- Keccak
- A Decision Procedure for Bit-Vectors and Arrays
- A Differential-Linear Attack on 12-Round Serpent
This page was built for publication: Cryptanalysis of Ascon