Cryptanalysis of Block Ciphers with New Design Strategies

M Tolba - 2017 - spectrum.library.concordia.ca
… energy block cipher Midori128; the high diffusion rate block cipher … In spite of the fact that
this technique has a low data complexity, … technique exploited in the biclique cryptanalysis [40], …

[PDF][PDF] Biclique cryptanalysis using balanced complete bipartite subgraphs

Z Gong, S Liu, Y Wen, Y Luo, W Qiu - Science China Information …, 2016 - scis.scichina.com
Low-data complexity biclique cryptanalysis of block ciphers with application to Piccolo and
HIGHT… key length for a block cipher: an attack on every practical block cipher. Sci China Inf Sci…

Biclique cryptanalysis of Twine-128

SRH Najarkolaei, MZ Ahangarkolaei… - … Iranian Society of …, 2016 - ieeexplore.ieee.org
… In this section, we propose a low data biclique attack on Twine-128 using asymmetric …
Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight." …

New results in biclique cryptanalysis of full round GIFT

KB Jithendra, ST Kassim - Journal of Intelligent & Fuzzy …, 2021 - content.iospress.com
… But the application of bicliques along with meet-in-the-middle … complexity is very high
especially in the case of GIFT-128. … for the very low data complexity requirement for biclique attack …

Generalized meet in the middle cryptanalysis of block ciphers with an automated search algorithm

S Ahmadi, MR Aref - IEEE Access, 2019 - ieeexplore.ieee.org
block ciphers, in this paper HIGHT [18], Piccolo-128 [19], CRAFT [20] and AES-128 [21] …
Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo and hight." …

Analysis of block cipher constructions against biclique and multiset attacks

M Ghosh, SK Sanadhya, D Chang - 2016 - repository.iiitd.edu.in
… and use them to solve the problem of high data complexity … We apply a variant of biclique
technique - termed as sliced … For example, key schedules of block ciphers such as PICCOLO […

Unbalanced biclique cryptanalysis of full-round GIFT

G Han, H Zhao, C Zhao - IEEE Access, 2019 - ieeexplore.ieee.org
biclique with data complexity of 216 and time complexity of … , PRESENT [13], [14], Piccolo
[15], [16], HIGHT [17], [19], IDEA … focus on the biclique cryptanalysis of GIFT block cipher. The …

Generator sets for the selection of key differences in the Biclique Attack

GC de Carvalho - Anais do XXII Simpósio Brasileiro em Segurança …, 2022 - sol.sbc.org.br
… On the low data complexity method, choosing different … To show the potential of this attack,
we apply it to the AES … to other ciphers, such as the AES, PRESENT, HIGHT and many others. …

[PDF][PDF] ISeCure

… along with the low data complexity biclique attack [22], we can … We apply our attacks on
LBlock and LBlock with modified key … According to high computational complexities, it should be …

Zero correlation linear attack on reduced round Piccolo-80

MZ Ahangarkolaei, SRH Najarkolaei… - … Iranian Society of …, 2016 - ieeexplore.ieee.org
Low-data complexity biclique cryptanalysis of block ciphers with application to piccolo
and hight." Information Forensics and Security, IEEE Transactions on 9.10 (2014): 1641-1652. …