Improving the rectangle attack on GIFT-64
From MaRDI portal
Publication:6620033
DOI10.1007/978-3-031-53368-6_3zbMATH Open1547.94339MaRDI QIDQ6620033
Zhuohui Feng, Yincen Chen, Xuanyu Liang, Qianqian Yang, Nana Zhang, Ling Song
Publication date: 16 October 2024
symmetric cryptographykey recovery attackrectangle attackGIFT-64key guessing strategyrelated-key scenario
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- Improved (related-key) differential cryptanalysis on GIFT
- Boomerang Connectivity Table: a new cryptanalysis tool
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- On probability of success in linear and differential cryptanalysis
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- PRESENT: An Ultra-Lightweight Block Cipher
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- GIFT: A Small Present
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- Improved attacks on \texttt{GIFT-64}
This page was built for publication: Improving the rectangle attack on GIFT-64
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6620033)