Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
From MaRDI portal
Publication:2102070
DOI10.1007/978-3-030-56877-1_13zbMath1504.94132OpenAlexW3048511689MaRDI QIDQ2102070
Patrick Derbez, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Paul Huynh, Virginie Lallemand
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_13
differential attacksdistinguisherforgeryround constantsdedicated cryptanalysisimplemented attackslightweight primitivesspook
Related Items (3)
Triangulating rebound attack on AES-like hashing ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- LEA
- Midori: A Block Cipher for Low Energy
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Limited-Birthday Distinguishers for Hash Functions
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
- PRESENT: An Ultra-Lightweight Block Cipher
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
This page was built for publication: Cryptanalysis results on spook. Bringing full-round shadow-512 to the light