Conditional Differential Cryptanalysis of Trivium and KATAN
From MaRDI portal
Publication:2889871
Recommendations
- Conditional differential cryptanalysis for Kreyvium
- Differential Cryptanalysis of Keccak Variants
- Differential cryptanalysis of KHF
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- An Improved Truncated Differential Cryptanalysis of Klein
- Differential Cryptanalysis for Multivariate Schemes
- Differential cryptanalysis in the fixed-key model
- scientific article; zbMATH DE number 1302839
- Differential-Linear Cryptanalysis Revisited
Cites work
- scientific article; zbMATH DE number 1024056 (Why is no real title available?)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Breaking Grain-128 with dynamic cube attacks
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- Cube Attacks on Tweakable Black Box Polynomials
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Greedy distinguishers and nonrandomness detectors
- Higher Order Derivatives and Differential Cryptanalysis
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Polybori: A framework for Gröbner-basis computations with Boolean polynomials
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Two Trivial Attacks on Trivium
Cited in
(16)- Symbolic-like computation and conditional differential cryptanalysis of QUARK
- High order differential attacks on stream ciphers
- Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
- Conditional differential cryptanalysis of 105 round Grain v1
- Conditional differential cryptanalysis of NLFSR-based cryptosystems
- New cube distinguishers on NFSR-based stream ciphers
- The MILP-aided conditional differential attack and its application to Trivium
- Some cryptanalytic results on TRIAD
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Cryptanalysis of the loiss stream cipher
- Correlation cube attacks: from weak-key distinguisher to key recovery
- An Improved Truncated Differential Cryptanalysis of Klein
- Conditional differential cryptanalysis for Kreyvium
- Quark: a lightweight hash
- Observing biases in the state: case studies with Trivium and Trivia-SC
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
This page was built for publication: Conditional Differential Cryptanalysis of Trivium and KATAN
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889871)