Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
From MaRDI portal
Publication:2817822
Recommendations
- Related-key boomerang attacks on KATAN32/48/64
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- Related-Key Boomerang and Rectangle Attacks
- Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
Cites work
- scientific article; zbMATH DE number 1722685 (Why is no real title available?)
- scientific article; zbMATH DE number 2089123 (Why is no real title available?)
- scientific article; zbMATH DE number 503238 (Why is no real title available?)
- scientific article; zbMATH DE number 1088930 (Why is no real title available?)
- scientific article; zbMATH DE number 1759263 (Why is no real title available?)
- scientific article; zbMATH DE number 1418251 (Why is no real title available?)
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- Differential and Rectangle Attacks on Reduced-Round SHACAL-1
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
- Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
- Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Links among impossible differential, integral and zero correlation linear cryptanalysis
- Match box meet-in-the-middle attack against KATAN
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Multiple differential cryptanalysis: theory and practice
- New links between differential and linear cryptanalysis
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Related-Key Rectangle Attack on 42-Round SHACAL-2
- Related-key boomerang attacks on KATAN32/48/64
Cited in
(7)- Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
- Related-key boomerang attacks on KATAN32/48/64
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- Improved related-tweakey boomerang attacks on Deoxys-BC
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Utilizing FWT in linear cryptanalysis of block ciphers with various structures
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
This page was built for publication: Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2817822)