Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
From MaRDI portal
Publication:2946932
DOI10.1007/978-3-662-48116-5_1zbMath1367.94300OpenAlexW603286849MaRDI QIDQ2946932
Patrick Derbez, Léo Perrin, Alex Biryukov
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48116-5_1
Related Items (8)
WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Generalized MitM attacks on full TWINE ⋮ Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis ⋮ Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE ⋮ Note on Impossible Differential Attacks ⋮ Making the impossible possible ⋮ Differential Forgery Attack Against LAC
This page was built for publication: Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE