logo

SCIENCE CHINA Information Sciences, Volume 60, Issue 3: 038102(2017) https://doi.org/10.1007/s11432-016-0283-3

Cryptanalysis of round-reduced ASCON

More info
  • ReceivedApr 26, 2016
  • AcceptedAug 12, 2016
  • PublishedDec 20, 2016

Abstract


Funded by

National Natural Science Foundation of China(61133013)

National Natural Science Foundation of China(61572293)

National Basic Research Program of China(2013CB834205)

National Natural Science Foundation of China(61602276)

Program for New Century Excellent Talents in University of China(NCET-13-0350)


Acknowledgment

Acknowledgments

This work was supported by National Basic Research Program of China (Grant No. 2013CB834205), National Natural Science Foundation of China (Grant Nos. 61133013, 61572293, 61602276), and Program for New Century Excellent Talents in University of China (Grant No. NCET-13-0350).


References

[1] Dobraunig C, Eichlseder M, Mendel F, et al. Cryptanalysis of Ascon. In: Proceedings of the Cryptographer's Track at the RSA Conference, San Francisco, 2015. 371--387. Google Scholar

[2] Dinur I, Morawiecki P, Pieprzyk J, et al. Cube attacks and cube-attack-like cryptanalysis on the round-reduced keccak sponge function. In: Advances in Cryptology---EUROCRYPT 2015. Berlin: Springer, 2015. 733--761. Google Scholar

[3] Aumasson J-P, Dinur I, Meier W, et al. Cube testers and key recovery attacks on reduced-round MD6 and trivium. In: Fast Software Encryption. Berlin: Springer, 2009. 1--22. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1