Diving Deep into the Weak Keys of Round Reduced Ascon
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds Ascon without violating the designer’s security claims of nonce-respecting setting and data limit of 264 blocks per key. So far, these are the best attacks on 7 rounds Ascon. However, the distinguishe...
Guardado en:
Autores principales: | Raghvendra Rohit, Santanu Sarkar |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Ruhr-Universität Bochum
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/b21ae31362114a7eade4c9c4b38936f8 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
Automatic Search of Cubes for Attacking Stream Ciphers
por: Yao Sun
Publicado: (2021) -
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis
por: Kaisa Nyberg
Publicado: (2021) -
Embedding delay‐based physical unclonable functions in networks‐on‐chip
por: Prasad Nagabhushanamgari, et al.
Publicado: (2021) -
Measuring the Correctness of Double-Keying: Error Classification and Quality Control in a Large Corpus of TEI-Annotated Historical Text
por: Susanne Haaf, et al.
Publicado: (2015) -
Research and Implementation of Fast-LPRNet Algorithm for License Plate Recognition
por: Zhichao Wang, et al.
Publicado: (2021)