Forgery Attacks on Round-Reduced ICEPOLE-128
From MaRDI portal
Publication:2807228
Recommendations
- A practical forgery attack on Lilliput-AE
- Twisted Polynomials and Forgery Attacks on GCM
- Forgery attacks on FlexAE and FlexAEAD
- Universal forgery attack against GCM-RUP
- Optimal forgeries against polynomial-based MACs and GCM
- Forgery attacks on two provably secure certificateless signature schemes
- On weak keys and forgery attacks against polynomial-based MAC schemes
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Forging attacks on two authenticated encryption schemes COBRA and POET
- Differential cryptanalysis of reduced-round ICEBERG
Cites work
- Branching heuristics in differential collision search with applications to SHA-512
- Differential cryptanalysis of DES-like cryptosystems
- Differential cryptanalysis of SipHash
- Differential-linear cryptanalysis of ICEPOLE
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- Finding SHA-1 Characteristics: General Results and Applications
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
- Improving local collisions: new attacks on reduced SHA-256
- NORX: Parallel and scalable AEAD
- On the Indifferentiability of the Sponge Construction
Cited in
(6)
This page was built for publication: Forgery Attacks on Round-Reduced ICEPOLE-128
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807228)