+

Shi et al., 2015 - Google Patents

Practical‐time related‐key attack on Hummingbird‐2

Shi et al., 2015

View PDF @Full View
Document ID
14049732915012529537
Author
Shi Z
Zhang B
Feng D
Publication year
Publication venue
IET Information Security

External Links

Snippet

Hummingbird‐2, designed by Engels et al., is a lightweight cipher with built‐in MAC functionality. In this study, the authors examine the security of Hummingbird‐2 in the related‐ key model. First, the authors define a new cryptographic notion of an S‐box, called …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Liu et al. Chaos‐based fast colour image encryption scheme with true random number keys from environmental noise
Li et al. Colour image encryption based on advanced encryption standard algorithm with two‐dimensional chaotic map
Zhang et al. Security evaluation on Simeck against zero‐correlation linear cryptanalysis
Ahmadian et al. Biclique cryptanalysis of the full‐round KLEIN block cipher
Morawiecki Practical attacks on the round‐reduced PRINCE
Yang et al. Impossible differential attacks on the SKINNY family of block ciphers
Saarinen Related-key attacks against full Hummingbird-2
Dong et al. Known‐key distinguishers on 15‐round 4‐branch type‐2 generalised Feistel networks with single substitution–permutation functions and near‐collision attacks on its hashing modes
Zhang et al. A novel differential fault analysis using two‐byte fault model on AES Key schedule
Sadeghi et al. Improved zero‐correlation and impossible differential cryptanalysis of reduced‐round SIMECK block cipher
Fu et al. New integral attacks on SIMON
Liu et al. Fault attacks on authenticated encryption modes for GIFT
Wang et al. Cryptanalysis of a white‐box SM4 implementation based on collision attack
Zhao et al. Differential fault analysis on LED using Super‐Sbox
Soleimany Self‐similarity cryptanalysis of the block cipher ITUbee
Shiraya et al. MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca
Li et al. Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC
Tian et al. Integral cryptanalysis on two block ciphers Pyjamask and uBlock
Yi et al. Multidimensional zero‐correlation linear cryptanalysis of the block cipher KASUMI
Shi et al. Practical‐time related‐key attack on Hummingbird‐2
Li et al. Meet‐in‐the‐middle attacks on round‐reduced tweakable block cipher Deoxys‐BC
Mala Biclique‐based cryptanalysis of the block cipher SQUARE
Min et al. Differential fault attack on GIFT
Dhandabani et al. Six‐face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes
Shi et al. Cryptanalysis of AEGIS‐128
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载