Shi et al., 2015 - Google Patents
Practical‐time related‐key attack on Hummingbird‐2Shi et al., 2015
View PDF- Document ID
- 14049732915012529537
- Author
- Shi Z
- Zhang B
- Feng D
- Publication year
- Publication venue
- IET Information Security
External Links
Snippet
Hummingbird‐2, designed by Engels et al., is a lightweight cipher with built‐in MAC functionality. In this study, the authors examine the security of Hummingbird‐2 in the related‐ key model. First, the authors define a new cryptographic notion of an S‐box, called …
- 230000001419 dependent 0 abstract description 9
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Liu et al. | Chaos‐based fast colour image encryption scheme with true random number keys from environmental noise | |
| Li et al. | Colour image encryption based on advanced encryption standard algorithm with two‐dimensional chaotic map | |
| Zhang et al. | Security evaluation on Simeck against zero‐correlation linear cryptanalysis | |
| Ahmadian et al. | Biclique cryptanalysis of the full‐round KLEIN block cipher | |
| Morawiecki | Practical attacks on the round‐reduced PRINCE | |
| Yang et al. | Impossible differential attacks on the SKINNY family of block ciphers | |
| Saarinen | Related-key attacks against full Hummingbird-2 | |
| Dong et al. | Known‐key distinguishers on 15‐round 4‐branch type‐2 generalised Feistel networks with single substitution–permutation functions and near‐collision attacks on its hashing modes | |
| Zhang et al. | A novel differential fault analysis using two‐byte fault model on AES Key schedule | |
| Sadeghi et al. | Improved zero‐correlation and impossible differential cryptanalysis of reduced‐round SIMECK block cipher | |
| Fu et al. | New integral attacks on SIMON | |
| Liu et al. | Fault attacks on authenticated encryption modes for GIFT | |
| Wang et al. | Cryptanalysis of a white‐box SM4 implementation based on collision attack | |
| Zhao et al. | Differential fault analysis on LED using Super‐Sbox | |
| Soleimany | Self‐similarity cryptanalysis of the block cipher ITUbee | |
| Shiraya et al. | MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca | |
| Li et al. | Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC | |
| Tian et al. | Integral cryptanalysis on two block ciphers Pyjamask and uBlock | |
| Yi et al. | Multidimensional zero‐correlation linear cryptanalysis of the block cipher KASUMI | |
| Shi et al. | Practical‐time related‐key attack on Hummingbird‐2 | |
| Li et al. | Meet‐in‐the‐middle attacks on round‐reduced tweakable block cipher Deoxys‐BC | |
| Mala | Biclique‐based cryptanalysis of the block cipher SQUARE | |
| Min et al. | Differential fault attack on GIFT | |
| Dhandabani et al. | Six‐face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes | |
| Shi et al. | Cryptanalysis of AEGIS‐128 |