Cargando…

Weak-keys and key-recovery attack for [Formula: see text]

In this paper, we study NIST lightweight 3rd round candidate [Formula: see text] . The core component of [Formula: see text] is the keyed permutation [Formula: see text] , which is based on a non-linear feedback shift register. By analysing this permutation carefully, we are able to find good cubes...

Descripción completa

Detalles Bibliográficos
Autores principales: Dutta, Pranjal, Rajasree, Mahesh Sreekumar, Sarkar, Santanu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9522731/
https://www.ncbi.nlm.nih.gov/pubmed/36175451
http://dx.doi.org/10.1038/s41598-022-19046-2