Improved (related-key) differential cryptanalysis on GIFT
From MaRDI portal
Publication:832340
DOI10.1007/978-3-030-81652-0_8zbMATH Open1485.94096OpenAlexW3186008327MaRDI QIDQ832340FDOQ832340
Authors: Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding
Publication date: 25 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81652-0_8
Recommendations
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- MILP-based differential attack on round-reduced GIFT
GIFTboomerang attackclustering effectMatsui's algorithmrectangle attackrelated-key differential trailsingle-key differential trail
Cites Work
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Title not available (Why is that?)
- PRESENT: An Ultra-Lightweight Block Cipher
- Title not available (Why is that?)
- On probability of success in linear and differential cryptanalysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- New types of cryptanalytic attacks using related keys
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Information Security and Privacy
- Related-Key Boomerang and Rectangle Attacks
- Advances in Cryptology - CRYPTO 2003
- A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
- Title not available (Why is that?)
- Title not available (Why is that?)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Boomerang Connectivity Table: a new cryptanalysis tool
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- MILP-based differential attack on round-reduced GIFT
- Speeding up the search algorithm for the best differential and best linear trails
- Best differential characteristic search of FEAL
Cited In (14)
- Generic framework for key-guessing improvements
- Improved attacks on \texttt{GIFT-64}
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- MILP-based differential attack on round-reduced GIFT
- Related-key differential cryptanalysis of GMiMC used in post-quantum signatures
- Improving the rectangle attack on GIFT-64
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- ExtPFA: extended persistent fault analysis for deeper rounds of bit permutation based ciphers with a case study on GIFT
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Improved differential attacks on GIFT-64
- Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
Uses Software
This page was built for publication: Improved (related-key) differential cryptanalysis on GIFT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832340)