Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128

被引:0
|
作者
Cui, Jiamin [1 ,2 ]
Hu, Kai [1 ,2 ]
Wang, Qingju [3 ]
Wang, Meiqin [1 ,2 ]
机构
[1] School of Cyber Science and Technology, Shandong University, Shandong, Qingdao,266237, China
[2] Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Shandong, Qingdao, China
[3] SnT, University of Luxembourg, Esch-sur-Alzette, Luxembourg
关键词
723.2 Data Processing and Image Processing - 921.1 Algebra;
D O I
暂无
中图分类号
学科分类号
摘要
30
引用
收藏
页码:223 / 246
相关论文
共 50 条
  • [1] Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
    Cui, Jiamin
    Hu, Kai
    Wang, Qingju
    Wang, Meiqin
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 223 - 246
  • [2] Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96
    Dobraunig, Christoph
    Rotella, Yann
    Schoone, Jan
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (01) : 289 - 312
  • [3] Cube attacks on round-reduced TinyJAMBU
    Teng, Wil Liam
    Salam, Iftekhar
    Yau, Wei-Chuen
    Pieprzyk, Josef
    Phan, Raphael C-W
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [4] Practical attacks on the round-reduced PRINCE
    Morawiecki, Pawel
    IET INFORMATION SECURITY, 2017, 11 (03) : 146 - 151
  • [5] Algebraic Attacks on Round-Reduced Keccak
    Liu, Fukang
    Isobe, Takanori
    Meier, Willi
    Yang, Zhonghao
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 91 - 110
  • [6] Cube attacks on round-reduced TinyJAMBU
    Wil Liam Teng
    Iftekhar Salam
    Wei-Chuen Yau
    Josef Pieprzyk
    Raphaël C.-W. Phan
    Scientific Reports, 12
  • [7] Cube attacks on round-reduced MORUS and Gimli
    Siwei Chen
    Zejun Xiang
    Xiangyong Zeng
    Shasha Zhang
    Science China Information Sciences, 2022, 65
  • [8] Improved Practical Attacks on Round-Reduced Keccak
    Dinur, Itai
    Dunkelman, Orr
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2014, 27 (02) : 183 - 209
  • [9] Cube attacks on round-reduced MORUS and GimLi
    Siwei CHEN
    Zejun XIANG
    Xiangyong ZENG
    Shasha ZHANG
    Science China(Information Sciences), 2022, 65 (01) : 265 - 267
  • [10] Improved Practical Attacks on Round-Reduced Keccak
    Itai Dinur
    Orr Dunkelman
    Adi Shamir
    Journal of Cryptology, 2014, 27 : 183 - 209