2020
DOI: 10.1007/978-3-030-65411-5_24
|View full text |Cite
|
Sign up to set email alerts
|

Integral Cryptanalysis of Reduced-Round Tweakable TWINE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…The AES is the most important symmetric-key algorithm in use, and many different cryptanalysis techniques applied against it need the existence of good differential characteristics to work. It is thus important for such an important target, to be able to confirm by other methods the results that were found by generic solvers, especially as bugs in such solvers have already been discovered in the past (see for example [EY20]). Our dynamic approach method permitted to better understand the underlying difficulty of this problem and to propose a pure algorithmic approach that we believe can be adapted to other ciphers.…”
Section: Conclusion and Open Problemsmentioning
confidence: 96%
“…The AES is the most important symmetric-key algorithm in use, and many different cryptanalysis techniques applied against it need the existence of good differential characteristics to work. It is thus important for such an important target, to be able to confirm by other methods the results that were found by generic solvers, especially as bugs in such solvers have already been discovered in the past (see for example [EY20]). Our dynamic approach method permitted to better understand the underlying difficulty of this problem and to propose a pure algorithmic approach that we believe can be adapted to other ciphers.…”
Section: Conclusion and Open Problemsmentioning
confidence: 96%