An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
From MaRDI portal
Publication:3102195
DOI10.1007/978-3-642-25385-0_18zbMath1227.94042OpenAlexW1238158613MaRDI QIDQ3102195
Itai Dinur, Adi Shamir, Ralf Zimmermann, Tim Güneysu, Christof Paar
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_18
Related Items (11)
Conditional differential cryptanalysis of 105 round Grain v1 ⋮ Quark: a lightweight hash ⋮ Grain-128AEADv2: strengthening the initialization against key reconstruction ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ Near Collision Attack on the Grain v1 Stream Cipher ⋮ Conditional Cube Searching and Applications on Trivium-Variant Ciphers ⋮ Quantum security of grain-128/grain-128a stream cipher against HHL algorithm ⋮ A practical key-recovery attack on 805-round Trivium ⋮ Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Truncated differential based known-key attacks on round-reduced SIMON
This page was built for publication: An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware