Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128

被引:0
|
作者
Cui, Jiamin [1 ,2 ]
Hu, Kai [1 ,2 ]
Wang, Qingju [3 ]
Wang, Meiqin [1 ,2 ]
机构
[1] School of Cyber Science and Technology, Shandong University, Shandong, Qingdao,266237, China
[2] Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Shandong, Qingdao, China
[3] SnT, University of Luxembourg, Esch-sur-Alzette, Luxembourg
关键词
723.2 Data Processing and Image Processing - 921.1 Algebra;
D O I
暂无
中图分类号
学科分类号
摘要
30
引用
收藏
页码:223 / 246
相关论文
共 50 条
  • [31] Integral Cryptanalysis of Round-Reduced Shadow-32 for IoT Nodes
    Mirzaie, Atiyeh
    Ahmadi, Siavash
    Aref, Mohammad Reza
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10592 - 10599
  • [32] Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES
    Grassi, Lorenzo
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (02) : 133 - 160
  • [33] Improved Conditional Differential Attacks on Round-Reduced Grain v1
    Li, Jun-Zhi
    Guan, Jie
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4548 - 4559
  • [34] Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search
    Ma, Zhangjun
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2023, 17 (03) : 534 - 543
  • [35] Truncated Differential-Neural Key Recovery Attacks on Round-Reduced HIGHT
    Seok, Byoungjin
    ELECTRONICS, 2024, 13 (20)
  • [36] Truncated differential based known-key attacks on round-reduced SIMON
    Hao, Yonglin
    Meier, Willi
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 83 (02) : 467 - 492
  • [37] Truncated differential based known-key attacks on round-reduced SIMON
    Yonglin Hao
    Willi Meier
    Designs, Codes and Cryptography, 2017, 83 : 467 - 492
  • [38] New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
    YE Chendong
    TIAN Tian
    ChineseJournalofElectronics, 2019, 28 (04) : 698 - 705
  • [39] Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced KECCAK
    Song, Ling
    Liao, Guohong
    Guo, Jian
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 428 - 451
  • [40] Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
    Zou, Jian
    Wu, Wen-Ling
    Wu, Shuang
    Dong, Le
    Tongxin Xuebao/Journal on Communications, 2013, 34 (06): : 8 - 15