Security analysis of subterranean 2.0
From MaRDI portal
Publication:2043414
DOI10.1007/S10623-021-00892-6zbMath1469.94113OpenAlexW3170515938MaRDI QIDQ2043414
Ling Song, Lei Hu, Danping Shi, Yi Tu
Publication date: 2 August 2021
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-021-00892-6
Related Items (2)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS
- Linear Biases in AEGIS Keystream
- Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- ALE: AES-Based Lightweight Authenticated Encryption
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
- Observations on the SIMON Block Cipher Family
- Cryptanalysis of MORUS
This page was built for publication: Security analysis of subterranean 2.0