A low-complexity key-recovery attack on 6-round Midori64
From MaRDI portal
Publication:6594946
DOI10.1007/S11424-023-1452-1zbMATH Open1546.9411MaRDI QIDQ6594946
Publication date: 29 August 2024
Published in: Journal of Systems Science and Complexity (Search for Journal in Brave)
Cites Work
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- The design of Rijndael. The Advanced Encryption Standard (AES)
- The retracing boomerang attack
- The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts
- Yoyo tricks with AES
- Midori: A Block Cipher for Low Energy
- LBlock: A Lightweight Block Cipher
- PRESENT: An Ultra-Lightweight Block Cipher
- A New Structural-Differential Property of 5-Round AES
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
This page was built for publication: A low-complexity key-recovery attack on 6-round Midori64
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6594946)