Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
From MaRDI portal
Publication:6135400
DOI10.1007/978-3-031-22963-3_10zbMath1519.94184OpenAlexW4317928333MaRDI QIDQ6135400
Anyu Wang, Lingyue Qin, Xiaoyang Dong, Jialiang Hua, Xiaoyun Wang
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22963-3_10
Cites Work
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Boomerang Connectivity Table: a new cryptanalysis tool
- Uniform first-order threshold implementations
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Lightweight authenticated encryption mode suitable for threshold implementation
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- A practical forgery attack on Lilliput-AE
- Constructing TI-friendly substitution boxes using shift-invariant permutations
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Sieve-in-the-Middle: Improved MITM Attacks
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Match Box Meet-in-the-Middle Attack Against KATAN
- Ciphers for MPC and FHE
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- A Single-Key Attack on the Full GOST Block Cipher
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- GIFT: A Small Present
- Related-Key Boomerang and Rectangle Attacks
- Advances in Cryptology - CRYPTO 2003
- New Cryptanalytic Results on IDEA
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Secret can be public: low-memory AEAD mode for high-order masking
- Simplified MITM modeling for permutations: new (quantum) attacks
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}