Related-Key Boomerang Attacks on KATAN32/48/64
- 1 January 2013
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle ApproachLecture Notes in Computer Science, 2013
- An All-In-One Approach to Differential Cryptanalysis for Small Block CiphersLecture Notes in Computer Science, 2013
- Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64Lecture Notes in Computer Science, 2012
- Conditional Differential Cryptanalysis of Trivium and KATANLecture Notes in Computer Science, 2012
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)Lecture Notes in Computer Science, 2011
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANLecture Notes in Computer Science, 2011
- Conditional Differential Cryptanalysis of NLFSR-Based CryptosystemsLecture Notes in Computer Science, 2010
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block CiphersLecture Notes in Computer Science, 2009
- Related-Key Boomerang and Rectangle AttacksLecture Notes in Computer Science, 2005
- Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192Lecture Notes in Computer Science, 2005