Related-key attacks against full Hummingbird-2
From MaRDI portal
Publication:2946891
DOI10.1007/978-3-662-43933-3_24zbMATH Open1321.94088OpenAlexW2155350101MaRDI QIDQ2946891FDOQ2946891
Authors: Markku-Juhani O. Saarinen
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_24
Recommendations
authenticated encryptionlightweight cryptographyHummingbird-2Hummingbird-2nurelated-key cryptanalysis
Cites Work
- The cipher SHARK
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- The Hummingbird-2 lightweight authenticated encryption algorithm
- Title not available (Why is that?)
- A Pseudorandom Sequence--How Random Is It?
- On the need for multipermutations: Cryptanalysis of MD4 and SAFER
- Computing special powers in finite fields
- Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
- Helix: fast encryption and authentication in a single cryptographic primitive.
- The Ehrenfeucht-Mycielski Sequence
- On the security of Hummingbird-2 against side channel cube attacks
- Cryptanalysis of Hummingbird-1
Cited In (3)
This page was built for publication: Related-key attacks against full Hummingbird-2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946891)