Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX Ciphers with Applications to Chaskey

[1]  Orr Dunkelman,et al.  DLCT: A New Tool for Differential-Linear Cryptanalysis , 2019, IACR Cryptol. ePrint Arch..

[2]  Samuel Neves,et al.  BLAKE2: Simpler, Smaller, Fast as MD5 , 2013, ACNS.

[3]  Siwei Sun,et al.  Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette , 2021, IACR Cryptol. ePrint Arch..

[4]  Benoit Cogliati,et al.  On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks , 2015, EUROCRYPT.

[5]  Yosuke Todo,et al.  Improved Differential-Linear Attacks with Applications to ARX Ciphers , 2020, Journal of Cryptology.

[6]  Daniel J. Bernstein,et al.  The Salsa20 Family of Stream Ciphers , 2008, The eSTREAM Finalists.

[7]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[8]  Ingrid Verbauwhede,et al.  Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers , 2014, Selected Areas in Cryptography.

[9]  Susan K. Langford,et al.  Differential-Linear Cryptanalysis , 1994, CRYPTO.

[10]  Claude Carlet,et al.  Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.

[11]  Eli Biham,et al.  An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X , 2014, Selected Areas in Cryptography.

[12]  Gaëtan Leurent,et al.  Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning , 2016, EUROCRYPT.

[13]  David A. Wagner,et al.  The Boomerang Attack , 1999, FSE.

[14]  Vincent Rijmen,et al.  Rotational Cryptanalysis on MAC Algorithm Chaskey , 2020, IACR Cryptol. ePrint Arch..

[15]  Miia Hermelin,et al.  Multidimensional Linear Cryptanalysis , 2018, Journal of Cryptology.

[16]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[17]  Ron Steinfeld,et al.  Rotational Cryptanalysis of ARX Revisited , 2015, FSE.

[18]  Ivica Nikolic,et al.  Rotational Cryptanalysis of ARX , 2010, FSE.