Improved (related-key) differential cryptanalysis on GIFT
From MaRDI portal
Publication:832340
DOI10.1007/978-3-030-81652-0_8zbMATH Open1485.94096OpenAlexW3186008327MaRDI QIDQ832340FDOQ832340
Chunning Zhou, Tianyou Ding, Wentao Zhang, Fulei Ji
Publication date: 25 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81652-0_8
GIFTboomerang attackclustering effectMatsui's algorithmrectangle attackrelated-key differential trailsingle-key differential trail
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- GIFT: A Small Present
- PRESENT: An Ultra-Lightweight Block Cipher
- On probability of success in linear and differential cryptanalysis
- New types of cryptanalytic attacks using related keys
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Information Security and Privacy
- Related-Key Boomerang and Rectangle Attacks
- Advances in Cryptology - CRYPTO 2003
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Boomerang Connectivity Table: a new cryptanalysis tool
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- MILP-based differential attack on round-reduced GIFT
- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails
- Best differential characteristic search of FEAL
Cited In (8)
- Generic framework for key-guessing improvements
- Improved attacks on \texttt{GIFT-64}
- Related-key differential cryptanalysis of GMiMC used in post-quantum signatures
- Improving the rectangle attack on GIFT-64
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- ExtPFA: extended persistent fault analysis for deeper rounds of bit permutation based ciphers with a case study on GIFT
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
Uses Software
This page was built for publication: Improved (related-key) differential cryptanalysis on GIFT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832340)