2011 World Congress on Internet Security (WorldCIS-2011) 2011
DOI: 10.1109/worldcis17046.2011.5749857
|View full text |Cite
|
Sign up to set email alerts
|

Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…is attack is based on the assumption that the attacker has access to the encryption oracle and can use related keys as input. is kind of attack has been applied to many block ciphers successfully, such as AES and LBlock [11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…is attack is based on the assumption that the attacker has access to the encryption oracle and can use related keys as input. is kind of attack has been applied to many block ciphers successfully, such as AES and LBlock [11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, two non‐isomorphic biclique attacks [9] on full‐round Crypton was proposed by Shakiba et al . Besides, there is a related‐key impossible differential attack [10] on 9‐round Crypton presented in 2011. As for mCrypton, Park [11] gave a related‐key rectangle attack on 8‐round mCrypton‐128 in 2009 and Mala et al .…”
Section: Introductionmentioning
confidence: 99%
“…However, a related-key impossible differential attack on 9 rounds of Crypton-256 has been shown by Wei et al in 2011 [5]. For mCrypton, a related-key rectangle attack on 8 rounds of mCrypton-128 has been shown by Park in 2009 [6].…”
Section: Introductionmentioning
confidence: 99%