Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128

When analyzing a block cipher, the first step is to search for some valid distinguishers, for example, the differential trails in the differential cryptanalysis and the linear trails in the linear cryptanalysis. A distinguisher is advantageous if it can be utilized to attack more rounds and the amou...

Full description

Saved in:
Bibliographic Details
Published inIACR Transactions on Symmetric Cryptology Vol. 2021; no. 1; pp. 156 - 184
Main Authors Zong, Rui, Dong, Xiaoyang, Chen, Huaifeng, Luo, Yiyuan, Wang, Si, Li, Zheng
Format Journal Article
LanguageEnglish
Published Ruhr-Universität Bochum 01.01.2021
Subjects
Online AccessGet full text

Cover

Loading…