Some instant- and practical-time related-key attacks on KTANTAN32/48/64
From MaRDI portal
Publication:2889872
DOI10.1007/978-3-642-28496-0_13zbMATH Open1293.94051OpenAlexW2176429707MaRDI QIDQ2889872FDOQ2889872
Authors: Martin Ågren
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_13
Recommendations
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Related-key boomerang attacks on KATAN32/48/64
- Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
- Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- New types of cryptanalytic attacks using related keys
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
Cited In (4)
Uses Software
This page was built for publication: Some instant- and practical-time related-key attacks on KTANTAN32/48/64
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889872)