2022
DOI: 10.1007/s13389-022-00298-7
|View full text |Cite
|
Sign up to set email alerts
|

Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…It was applied in determining the least amount of active Sboxes in differential and linear attacks. Sun [21], [22] broaden their framework and gave an MILP model suitable for bit-oriented ciphers, which can give a more precise assessment of the resilience of ciphers against various at-tacks, for example, a linear analysis using MILP is presented to attack the block cipher GIFT [23]. Recently, a method grounded in Boolean satisfiability problem (SAT) [24] is proposed to assess the security of symmetric-key primitive designs.…”
Section: Introductionmentioning
confidence: 99%
“…It was applied in determining the least amount of active Sboxes in differential and linear attacks. Sun [21], [22] broaden their framework and gave an MILP model suitable for bit-oriented ciphers, which can give a more precise assessment of the resilience of ciphers against various at-tacks, for example, a linear analysis using MILP is presented to attack the block cipher GIFT [23]. Recently, a method grounded in Boolean satisfiability problem (SAT) [24] is proposed to assess the security of symmetric-key primitive designs.…”
Section: Introductionmentioning
confidence: 99%