2022
DOI: 10.1007/978-3-031-07082-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(18 citation statements)
references
References 15 publications
0
18
0
Order By: Relevance
“…We apply the birthday-paradox based MitM attack 1 , which has been widely used to attack Merkle-Damgård [17,51] hashing with PGV modes as well as block ciphers, to the sponge-based hash functions. Additionally, by applying bit conditions, the diffusion of the two neutral sets can be controlled and reduced, and therefore lead to longer MitM characteristics.…”
Section: Our Contributionsmentioning
confidence: 99%
See 4 more Smart Citations
“…We apply the birthday-paradox based MitM attack 1 , which has been widely used to attack Merkle-Damgård [17,51] hashing with PGV modes as well as block ciphers, to the sponge-based hash functions. Additionally, by applying bit conditions, the diffusion of the two neutral sets can be controlled and reduced, and therefore lead to longer MitM characteristics.…”
Section: Our Contributionsmentioning
confidence: 99%
“…After the θ operation, the variables will not diffuse. After the π operation, any two variables are not adjacent in a row, and all outputs of A (1) are linear. To further reduce the diffusion of the variables in χ operation, one can add restricted constraints to the value of constant bits.…”
Section: Preliminaries On Keccakmentioning
confidence: 99%
See 3 more Smart Citations