MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
From MaRDI portal
Publication:4639483
DOI10.1007/978-3-662-52993-5_14zbMath1387.94081OpenAlexW2495518322MaRDI QIDQ4639483
Siwei Sun, Yinghua Guo, Meiqin Wang, Kai Fu, Lei Hu
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-52993-5_14
Related Items
Counting active S-boxes is not enough, A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis, Revisiting the wrong-key-randomization hypothesis, Automatic tool for searching for differential characteristics in ARX ciphers and applications, Security analysis of SIMECK block cipher against related-key impossible differential, Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK, Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework, New method for combining Matsui's bounding conditions with sequential encoding method, Fully automated differential-linear attacks against ARX ciphers, Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks, Improved differential attack on round-reduced LEA, Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy, Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails, Several MILP-Aided Attacks Against SNOW 2.0, Monte Carlo tree search for automatic differential characteristics search: application to SPECK, A bit-vector differential model for the modular addition by a constant, Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions, Lombardi Drawings of Knots and Links, Improved Cryptanalysis on SipHash, Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck, Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK, Automatic search of meet-in-the-middle preimage attacks on AES-like hashing, A deeper look at machine learning-based cryptanalysis, Impossible Differential Attack on Reduced Round SPARX-64/128, Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey, Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX), New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- Automatic search for linear trails of the SPECK family
- Improved Differential Cryptanalysis of Round-Reduced Speck
- Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Differential Cryptanalysis of Round-Reduced Simon and Speck
- Differential Analysis of Block Ciphers SIMON and SPECK
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks
- Improved Linear Distinguishers for SNOW 2.0
- Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Automatic Search for Differential Trails in ARX Ciphers
- The Delicate Issues of Addition with Respect to XOR Differences
- Finding SHA-1 Characteristics: General Results and Applications
- Fast Software Encryption