Improved attacks on \texttt{GIFT-64}
From MaRDI portal
Publication:6618592
DOI10.1007/978-3-030-99277-4_12zbMATH Open1547.94419MaRDI QIDQ6618592
Meiqin Wang, Wei Wang, Ling Sun
Publication date: 14 October 2024
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Improved (related-key) differential cryptanalysis on GIFT
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- MILP-based differential attack on round-reduced GIFT
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- On probability of success in linear and differential cryptanalysis
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Observations on the SIMON Block Cipher Family
- Towards an Optimal CNF Encoding of Boolean Cardinality Constraints
- PRESENT: An Ultra-Lightweight Block Cipher
- Markov Ciphers and Differential Cryptanalysis
- GIFT: A Small Present
- Linear Cryptanalysis of Reduced-Round PRESENT
- The complexity of theorem-proving procedures
- Improved differential attacks on GIFT-64
Related Items (2)
Full round distinguishing and key-recovery attacks on SAND-2 ⋮ Improving the rectangle attack on GIFT-64
This page was built for publication: Improved attacks on \texttt{GIFT-64}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6618592)