Forgery Attacks on Round-Reduced ICEPOLE-128
From MaRDI portal
Publication:2807228
DOI10.1007/978-3-319-31301-6_27zbMATH Open1396.94072OpenAlexW2402446753MaRDI QIDQ2807228FDOQ2807228
Authors: Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_27
Recommendations
- A practical forgery attack on Lilliput-AE
- Twisted Polynomials and Forgery Attacks on GCM
- Forgery attacks on FlexAE and FlexAEAD
- Universal forgery attack against GCM-RUP
- Optimal forgeries against polynomial-based MACs and GCM
- Forgery attacks on two provably secure certificateless signature schemes
- On weak keys and forgery attacks against polynomial-based MAC schemes
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Forging attacks on two authenticated encryption schemes COBRA and POET
- Differential cryptanalysis of reduced-round ICEBERG
Cites Work
- On the Indifferentiability of the Sponge Construction
- Differential cryptanalysis of DES-like cryptosystems
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- Finding SHA-1 Characteristics: General Results and Applications
- Improving local collisions: new attacks on reduced SHA-256
- Differential cryptanalysis of SipHash
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- NORX: Parallel and scalable AEAD
- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
- Branching heuristics in differential collision search with applications to SHA-512
- Differential-linear cryptanalysis of ICEPOLE
Cited In (6)
This page was built for publication: Forgery Attacks on Round-Reduced ICEPOLE-128
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807228)