2017
DOI: 10.1007/978-3-319-72565-9_7
|View full text |Cite
|
Sign up to set email alerts
|

sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
16
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(17 citation statements)
references
References 48 publications
1
16
0
Order By: Relevance
“…Also, we obtain 96 and 64 classes of impossible differentials for 15‐round SIMECK48 and 17‐round SIMECK64, respectively. These impossible differentials improve the previous best result by two rounds for SIMECK48 and SIMECK64 reported in [13]. Finally, we demonstrate impossible differential attacks on 22‐round SIMECK48 and 24‐round SIMECK64.…”
Section: Introductionsupporting
confidence: 75%
See 1 more Smart Citation
“…Also, we obtain 96 and 64 classes of impossible differentials for 15‐round SIMECK48 and 17‐round SIMECK64, respectively. These impossible differentials improve the previous best result by two rounds for SIMECK48 and SIMECK64 reported in [13]. Finally, we demonstrate impossible differential attacks on 22‐round SIMECK48 and 24‐round SIMECK64.…”
Section: Introductionsupporting
confidence: 75%
“…In this paper, we employ improved miss‐in‐the‐middle approach to find zero correlation linear distinguishers and impossible differentials on SIMECK. Based on this technique, we identified 96 and 64 classes of zero‐correlation linear approximations for 15‐round SIMECK48 and 17‐round SIMECK64, respectively, which these zero‐correlation linear approximations improve the previous best result by two rounds for SIMECK48 and SIMECK64 reported in [11, 13]. Then based on these distinguishers, we mount attacks on 27‐round SIMECK48 and 31‐round SIMECK64 delicately with the help of divide‐and‐conquer technique.…”
Section: Introductionmentioning
confidence: 99%
“…32-bit ARM micro-controllers allow one to perform a rotation "for free" since it can be executed together with another arithmetic/logical instruction. 3 Still, a 32-bit ARM processor can only perform rotations of 32-bit operands for free, but not rotations of 64-bit words. 2.…”
Section: Block and Word Sizesmentioning
confidence: 99%
“…Our approach relies on the long trail strategy pioneered by the designers of Sparx [19], and which was then used to build sLiSCP [3], sLiSCP-light [4] as well as the NIST lightweight candidates using them (SPIX [2], SPOC [1], Sparkle [8]). Provided that the round function allows its use, this method provides a simple algorithm for bounding the probability of differential and linear trails.…”
Section: Skeletons For a Family Of (Tweakable) Block Ciphersmentioning
confidence: 99%
“…There are two efficient software implementations of Simeck on IoT-embedded devices: 8-bit AVR [17] and 16-bit MSP430 [18]. Simeckbased permutations for lightweight sponge cryptographic primitive hardware implementation were proposed at SAC 2017 [19].…”
Section: Simeck Family Blockmentioning
confidence: 99%