Conditional Differential Cryptanalysis of Trivium and KATAN
From MaRDI portal
Publication:2889871
DOI10.1007/978-3-642-28496-0_12zbMath1292.94095OpenAlexW194052690MaRDI QIDQ2889871
Willi Meier, María Naya-Plasencia, Simon Knellwolf
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_12
Related Items (11)
Conditional differential cryptanalysis of 105 round Grain v1 ⋮ High order differential attacks on stream ciphers ⋮ Quark: a lightweight hash ⋮ Cryptanalysis of the Loiss Stream Cipher ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ The MILP-aided conditional differential attack and its application to Trivium ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Observing biases in the state: case studies with Trivium and Trivia-SC ⋮ New cube distinguishers on NFSR-based stream ciphers ⋮ Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
Uses Software
Cites Work
- Unnamed Item
- Polybori: A framework for Gröbner-basis computations with Boolean polynomials
- Breaking Grain-128 with Dynamic Cube Attacks
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Greedy Distinguishers and Nonrandomness Detectors
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Cube Attacks on Tweakable Black Box Polynomials
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Higher Order Derivatives and Differential Cryptanalysis
- Two Trivial Attacks on Trivium
This page was built for publication: Conditional Differential Cryptanalysis of Trivium and KATAN