Practical cryptanalysis of full Sprout with TMD tradeoff attacks
From MaRDI portal
Publication:2807196
DOI10.1007/978-3-319-31301-6_4zbMATH Open1396.94074OpenAlexW2397074368MaRDI QIDQ2807196FDOQ2807196
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_4
Recommendations
stream cipherdivide-and-conquerLFSRNLFSRkeystream generatorguess-and-determineSprouttime memory data tradeoff attacks
Cites Work
- LBlock: A Lightweight Block Cipher
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- ITUbee: A Software Oriented Lightweight Block Cipher
- PRESENT: An Ultra-Lightweight Block Cipher
- Title not available (Why is that?)
- A cryptanalytic time-memory trade-off
- Title not available (Why is that?)
- Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- On Lightweight Stream Ciphers with Shorter Internal States
- Cryptanalysis of Full Sprout
Cited In (6)
- FAN: a lightweight authenticated cryptographic algorithm
- Some results on Fruit
- On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks
- Design and analysis of small-state grain-like stream ciphers
- Near collision attack against Grain v1
- Some results on lightweight stream ciphers Fountain v1 \& lizard
Uses Software
This page was built for publication: Practical cryptanalysis of full Sprout with TMD tradeoff attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807196)