Differential analysis and meet-in-the-middle attack against round-reduced TWINE
From MaRDI portal
Publication:2946932
DOI10.1007/978-3-662-48116-5_1zbMATH Open1367.94300OpenAlexW603286849MaRDI QIDQ2946932FDOQ2946932
Authors: Alex Biryukov, Patrick Derbez, Léo Perrin
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48116-5_1
Recommendations
Cited In (18)
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- Biclique cryptanalysis of LBlock and TWINE
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Impossible differential cryptanalysis of reduced-round tweakable TWINE
- Making the impossible possible
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Note on impossible differential attacks
- Multidimensional meet-in-the-middle attacks on reduced-round TWINE-128
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Generalized MitM attacks on full TWINE
- Accurate estimation of the full differential distribution for general Feistel structures
- Differential Forgery Attack Against LAC
- Iterative differential characteristic of TRIFLE-BC
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Cryptanalysis of TWIS block cipher
- Impossible differential attack on reduced-round TWINE
- Meet-in-the-middle attack on TWINE block cipher
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging
This page was built for publication: Differential analysis and meet-in-the-middle attack against round-reduced TWINE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946932)