Differential-linear cryptanalysis of ICEPOLE
From MaRDI portal
Publication:2946945
Recommendations
Cited in
(12)- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
- The design of the ICE encryption algorithm
- Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
- Differential-linear cryptanalysis revisited
- Survey on recent trends towards generalized differential and boomerang uniformities
- Differential-linear cryptanalysis of round-reduced SPARX-64/128
- Differential Cryptanalysis of the ICE Encryption Algorithm
- Forgery Attacks on Round-Reduced ICEPOLE-128
- Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity
- New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128
- Vectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type construction
- A theoretical analysis of generalized invariants of bijective S-boxes
This page was built for publication: Differential-linear cryptanalysis of ICEPOLE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946945)