Cryptanalysis of \texttt{SPEEDY}
From MaRDI portal
Publication:6535482
Recommendations
Cites work
- scientific article; zbMATH DE number 3473353 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1406763 (Why is no real title available?)
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Cryptanalysis of reduced round SPEEDY
- DLCT: a new tool for differential-linear cryptanalysis
- Differential cryptanalysis of DES-like cryptosystems
- Improved differential-linear attacks with applications to ARX ciphers
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- On probability of success in linear and differential cryptanalysis
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
- Satisfiability modulo theories
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys
This page was built for publication: Cryptanalysis of \texttt{SPEEDY}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535482)