\textsf{tHyENA}: making \textsf{HyENA} even smaller
From MaRDI portal
Publication:6157569
DOI10.1007/978-3-030-92518-5_2zbMath1514.94059OpenAlexW4205328306MaRDI QIDQ6157569
Mridul Nandi, Nilanjan Datta, Avik Chakraborti, Cuauhtemoc Mancillas-López, Ashwin Jha
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92518-5_2
Cites Work
- Unnamed Item
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory
- Finding integral distinguishers with ease
- On the optimality of non-linear computations for symmetric key primitives
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- Blockcipher-based authenticated encryption: how small can we go?
- MILP-based differential attack on round-reduced GIFT
- A Provable-Security Treatment of the Key-Wrap Problem
- The “Coefficients H” Technique
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- Blockcipher-Based Authenticated Encryption: How Small Can We Go?
- GIFT: A Small Present
- Tight Security Bounds for Key-Alternating Ciphers
This page was built for publication: \textsf{tHyENA}: making \textsf{HyENA} even smaller