Some instant- and practical-time related-key attacks on KTANTAN32/48/64
From MaRDI portal
Publication:2889872
Recommendations
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Related-key boomerang attacks on KATAN32/48/64
- Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
- Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
Cites work
- scientific article; zbMATH DE number 417582 (Why is no real title available?)
- scientific article; zbMATH DE number 1024009 (Why is no real title available?)
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- New types of cryptanalytic attacks using related keys
Cited in
(4)
This page was built for publication: Some instant- and practical-time related-key attacks on KTANTAN32/48/64
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889872)