Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
From MaRDI portal
Publication:2817822
DOI10.1007/978-3-319-40367-0_21zbMath1346.94097OpenAlexW2505046855MaRDI QIDQ2817822
Azman Samsudin, Je Sen Teh, Jiageng Chen, Jun-bin Fang, Chun-hua Su
Publication date: 2 September 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-40367-0_21
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Match Box Meet-in-the-Middle Attack Against KATAN
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
- Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of Katan
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
- Multiple Differential Cryptanalysis: Theory and Practice
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
- Related-Key Rectangle Attack on 42-Round SHACAL-2
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- New Links between Differential and Linear Cryptanalysis
- Related-Key Boomerang Attacks on KATAN32/48/64
- Differential and Rectangle Attacks on Reduced-Round SHACAL-1