Impossible differential attacks on the SKINNY family of block ciphers (Englisch)
Freier Zugriff
- Neue Suche nach: Yang, Dong
- Neue Suche nach: Qi, Wen-Feng
- Neue Suche nach: Chen, Hua-Jin
- Neue Suche nach: Yang, Dong
- Neue Suche nach: Qi, Wen-Feng
- Neue Suche nach: Chen, Hua-Jin
In:
IET Information Security
;
11
, 6
;
377-385
;
2017
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Impossible differential attacks on the SKINNY family of block ciphers
-
Beteiligte:
-
Erschienen in:IET Information Security ; 11, 6 ; 377-385
-
Verlag:
- Neue Suche nach: The Institution of Engineering and Technology
-
Erscheinungsdatum:01.08.2017
-
Format / Umfang:9 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:21-round SKINNY-64-192 , impossible differential attacks , TWEAKEY framework , differential cryptanalysis , greedy algorithms , CRYPTO 2016 , n-bit block size , SKINNY cipher , 21-round encryptions , SKINNY-128-384 , 19-round SKINNY-64-128 , 19-round encryptions , early-abort technique , linear cryptanalysis , 17-round encryptions , lightweight block ciphers , cryptography , k-bit tweakey size , SKINNY-128-128 , 17-round SKINNY-64-64 , SKINNY-128-256 , greedy strategy , SKINNY-n-k , tweakey input
-
Datenquelle:
Metadata by IET is licensed under CC BY 3.0
Inhaltsverzeichnis – Band 11, Ausgabe 6
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 301
-
Low-latency digit-serial dual basis multiplier for lightweight cryptosystemsChiou, Che Wun / Lee, Chiou-Yng / Lin, Jim-Min / Yeh, Yun-Chi / Pan, Jeng-Shyang et al. | 2017
- 312
-
Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security testShao, Cuiping / Li, Huiyun / Zhou, Jianbin et al. | 2017
- 319
-
Defending shilling attacks in recommender systems using soft co-clusteringYang, Li / Huang, Wei / Niu, Xinxin et al. | 2017
- 326
-
Provably secure verifiable multi-stage secret sharing scheme based on monotone span programMashhadi, Samaneh / Hadian Dehkordi, Massoud / Kiamari, Niloofar et al. | 2017
- 332
-
Attribute-based encryption implies identity-based encryptionHerranz, Javier et al. | 2017
- 338
-
Memory attestation of wireless sensor nodes through trusted remote agentsYang, Po-Hung / Yen, Sung-Ming et al. | 2017
- 345
-
MNOS: a mimic network operating system for software defined networksHu, Hongchao / Wang, Zhenpeng / Cheng, Guozhen / Wu, Jiangxing et al. | 2017
- 356
-
Implementation flaws in the masking scheme of DPA Contest v4Veshchikov, Nikita / Guilley, Sylvain et al. | 2017
- 363
-
Internal state recovery of Grain v1 employing guess-and-determine attackMa, Zhen / Tian, Tian / Qi, Wen-Feng et al. | 2017
- 369
-
Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of ThingsYang, Wei / Wan, Yadong / Wang, Qin et al. | 2017
- 377
-
Impossible differential attacks on the SKINNY family of block ciphersYang, Dong / Qi, Wen-Feng / Chen, Hua-Jin et al. | 2017
- 386
-
Security assessment of the Spanish contactless identity cardRodríguez, Ricardo Julio / Garcia-Escartin, Juan Carlos et al. | 2017