2015
DOI: 10.1007/978-3-662-47989-6_32
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Full Sprout

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(28 citation statements)
references
References 23 publications
0
28
0
Order By: Relevance
“…Merging the lists and dissection algorithm such as that for divide-and-conquer and rebound attacks find applications in ARMADILLO2 [1], ECHO256 [76], JH42 [77], Grstl [70], Klein, AES-like, Sprout [59], and Ketje. Among the popular algorithm specific attack schemes, such as for PRESENT, the most effective approach as been multiple linear attacks using Sieving, forward and backward computations [60].…”
Section: Cryptanalysis Methodsmentioning
confidence: 99%
“…Merging the lists and dissection algorithm such as that for divide-and-conquer and rebound attacks find applications in ARMADILLO2 [1], ECHO256 [76], JH42 [77], Grstl [70], Klein, AES-like, Sprout [59], and Ketje. Among the popular algorithm specific attack schemes, such as for PRESENT, the most effective approach as been multiple linear attacks using Sieving, forward and backward computations [60].…”
Section: Cryptanalysis Methodsmentioning
confidence: 99%
“…Since the notion of stream ciphers with keyed update function is a new topic in lightweight cryptography, the research on stream ciphers with keyed update function are made in the last few years. [9], [10], [11], [12], [13], [16] are some examples of them.…”
Section: Related Workmentioning
confidence: 99%
“…Kara and Esgin introduced a guess and determine attack combined with a divide and conquer attack on full Sprout [9]. Lallemand and Plasencia proposed a divide-andconquer attack for recovering the key bits of Sprout [10]. Kara and Esgin introduced generalized divide and conquer attack on stream ciphers with keyed update function.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Unfortunately, a lot of attacks immediately broke this construction. A state recovery attack based on a guess and determine attack was first proposed in [39]. This attack was faster than exhaustive search by a factor of about 2 10 and had a memory complexity of 2 46 bits.…”
Section: Introductionmentioning
confidence: 99%