Rotational cryptanalysis on MAC algorithm chaskey
From MaRDI portal
Recommendations
- Key-Recovery Attacks Against the MAC Algorithm Chaskey
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
- Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
- Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning
- Rotational analysis of ChaCha permutation
Cites work
- scientific article; zbMATH DE number 697813 (Why is no real title available?)
- scientific article; zbMATH DE number 1418297 (Why is no real title available?)
- An improvement of linear cryptanalysis with addition operations with applications to FEAL-8X
- Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
- Cryptanalysis of hash functions on the MD4-family.
- Distinguisher and Related-Key Attack on the Full AES-256
- Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning
- Key-Recovery Attacks Against the MAC Algorithm Chaskey
- Known-Key Distinguishers for Some Block Ciphers
- Limitations of the Even-Mansour construction
- Markov Ciphers and Differential Cryptanalysis
- Minimalism in cryptography: the Even-Mansour scheme revisited
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Rotational cryptanalysis of ARX
- Rotational cryptanalysis of ARX revisited
- Rotational cryptanalysis of round-reduced \textsc{Keccak}
Cited in
(4)- Key-Recovery Attacks Against the MAC Algorithm Chaskey
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Rotational differential-linear cryptanalysis revisited
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey
This page was built for publication: Rotational cryptanalysis on MAC algorithm chaskey
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2229269)