Related-Key Attacks Against Full Hummingbird-2
From MaRDI portal
Publication:2946891
DOI10.1007/978-3-662-43933-3_24zbMath1321.94088OpenAlexW2155350101MaRDI QIDQ2946891
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_24
authenticated encryptionlightweight cryptographyHummingbird-2Hummingbird-2nurelated-key cryptanalysis
Cites Work
- Unnamed Item
- Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings
- A Pseudorandom Sequence--How Random Is It?
- Cryptographic Analysis of All 4 × 4-Bit S-Boxes
- The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
- On the Security of Hummingbird-2 against Side Channel Cube Attacks
- Cryptanalysis of Hummingbird-1
- The Ehrenfeucht-Mycielski Sequence
- On the need for multipermutations: Cryptanalysis of MD4 and SAFER
- The cipher SHARK
- Computing special powers in finite fields
- Fast Software Encryption
This page was built for publication: Related-Key Attacks Against Full Hummingbird-2