Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
From MaRDI portal
Publication:6135400
DOI10.1007/978-3-031-22963-3_10zbMATH Open1519.94184OpenAlexW4317928333MaRDI QIDQ6135400FDOQ6135400
Authors: Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22963-3_10
Recommendations
- Related-key impossible-differential attack on reduced-round \textsc{Skinny}
- Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
- Weak subtweakeys in SKINNY
Cites Work
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Advanced modern algebra
- Advances in Cryptology - CRYPTO 2003
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Title not available (Why is that?)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Improved single-key attacks on 8-round AES-192 and AES-256
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- A single-key attack on the full GOST block cipher
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Title not available (Why is that?)
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- Related-Key Boomerang and Rectangle Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Ciphers for MPC and FHE
- New Cryptanalytic Results on IDEA
- Threshold Implementations Against Side-Channel Attacks and Glitches
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Boomerang Connectivity Table: a new cryptanalysis tool
- Sieve-in-the-middle: improved MITM attacks
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Uniform first-order threshold implementations
- Related-key impossible-differential attack on reduced-round \textsc{Skinny}
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Automatic search of meet-in-the-middle and impossible differential attacks
- Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Lightweight authenticated encryption mode suitable for threshold implementation
- A practical forgery attack on Lilliput-AE
- Constructing TI-friendly substitution boxes using shift-invariant permutations
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Match box meet-in-the-middle attack against KATAN
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Simplified MITM modeling for permutations: new (quantum) attacks
- Secret can be public: low-memory AEAD mode for high-order masking
Cited In (4)
This page was built for publication: Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6135400)