MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck

From MaRDI portal
Publication:4639483

DOI10.1007/978-3-662-52993-5_14zbMath1387.94081OpenAlexW2495518322MaRDI QIDQ4639483

Siwei Sun, Yinghua Guo, Meiqin Wang, Kai Fu, Lei Hu

Publication date: 9 May 2018

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_14



Related Items

Counting active S-boxes is not enough, A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis, Revisiting the wrong-key-randomization hypothesis, Automatic tool for searching for differential characteristics in ARX ciphers and applications, Security analysis of SIMECK block cipher against related-key impossible differential, Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK, Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework, New method for combining Matsui's bounding conditions with sequential encoding method, Fully automated differential-linear attacks against ARX ciphers, Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks, Improved differential attack on round-reduced LEA, Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy, Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails, Several MILP-Aided Attacks Against SNOW 2.0, Monte Carlo tree search for automatic differential characteristics search: application to SPECK, A bit-vector differential model for the modular addition by a constant, Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions, Lombardi Drawings of Knots and Links, Improved Cryptanalysis on SipHash, Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck, Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK, Automatic search of meet-in-the-middle preimage attacks on AES-like hashing, A deeper look at machine learning-based cryptanalysis, Impossible Differential Attack on Reduced Round SPARX-64/128, Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey, Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX), New Impossible Differential Search Tool from Design and Cryptanalysis Aspects


Uses Software


Cites Work