Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
From MaRDI portal
Publication:2817822
DOI10.1007/978-3-319-40367-0_21zbMATH Open1346.94097OpenAlexW2505046855MaRDI QIDQ2817822FDOQ2817822
Authors: Jiageng Chen, Je Sen Teh, Azman Samsudin, Chun-hua Su, Junbin Fang
Publication date: 2 September 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-40367-0_21
Recommendations
- Related-key boomerang attacks on KATAN32/48/64
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- Related-Key Boomerang and Rectangle Attacks
- Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
Cites Work
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- Title not available (Why is that?)
- Multiple differential cryptanalysis: theory and practice
- All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach
- Title not available (Why is that?)
- Title not available (Why is that?)
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Title not available (Why is that?)
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Title not available (Why is that?)
- Title not available (Why is that?)
- Related-Key Rectangle Attack on 42-Round SHACAL-2
- Links among impossible differential, integral and zero correlation linear cryptanalysis
- Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
- New links between differential and linear cryptanalysis
- Match box meet-in-the-middle attack against KATAN
- Differential and Rectangle Attacks on Reduced-Round SHACAL-1
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
- Related-key boomerang attacks on KATAN32/48/64
Cited In (7)
- Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
- Related-key boomerang attacks on KATAN32/48/64
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- Improved related-tweakey boomerang attacks on Deoxys-BC
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Utilizing FWT in linear cryptanalysis of block ciphers with various structures
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
Uses Software
This page was built for publication: Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2817822)