Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
From MaRDI portal
Publication:6135400
Recommendations
- Related-key impossible-differential attack on reduced-round \textsc{Skinny}
- Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
- Weak subtweakeys in SKINNY
Cites work
- scientific article; zbMATH DE number 1722685 (Why is no real title available?)
- scientific article; zbMATH DE number 2089123 (Why is no real title available?)
- scientific article; zbMATH DE number 1759263 (Why is no real title available?)
- scientific article; zbMATH DE number 1418251 (Why is no real title available?)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- A practical forgery attack on Lilliput-AE
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- A single-key attack on the full GOST block cipher
- Advanced modern algebra
- Advances in Cryptology - CRYPTO 2003
- Automatic search of meet-in-the-middle and impossible differential attacks
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Boomerang Connectivity Table: a new cryptanalysis tool
- Ciphers for MPC and FHE
- Constructing TI-friendly substitution boxes using shift-invariant permutations
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
- Improved key recovery attacks on reduced-round AES in the single-key setting
- Improved single-key attacks on 8-round AES-192 and AES-256
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Lightweight authenticated encryption mode suitable for threshold implementation
- Match box meet-in-the-middle attack against KATAN
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- New Cryptanalytic Results on IDEA
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Related-Key Boomerang and Rectangle Attacks
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Related-key impossible-differential attack on reduced-round \textsc{Skinny}
- Secret can be public: low-memory AEAD mode for high-order masking
- Sieve-in-the-middle: improved MITM attacks
- Simplified MITM modeling for permutations: new (quantum) attacks
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Threshold Implementations Against Side-Channel Attacks and Glitches
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Uniform first-order threshold implementations
Cited in
(4)
This page was built for publication: Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6135400)