Cargando…
Weak-keys and key-recovery attack for [Formula: see text]
In this paper, we study NIST lightweight 3rd round candidate [Formula: see text] . The core component of [Formula: see text] is the keyed permutation [Formula: see text] , which is based on a non-linear feedback shift register. By analysing this permutation carefully, we are able to find good cubes...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9522731/ https://www.ncbi.nlm.nih.gov/pubmed/36175451 http://dx.doi.org/10.1038/s41598-022-19046-2 |