Key Recovery Attacks on Zorro Using Related-Key Differential Characteristics, and Collision Attacks on PGV-Zorro |
Kim, Giyoon
(Dept. of Information Security, Cryptology and Mathematics, Kookmin University)
Park, Eunhu (Dept. of Financial Information Security, Kookmin University) Lee, Jonghyeok (Dept. of Information Security, Cryptology and Mathematics, Kookmin University) Jang, Sungwoo (Dept. of Information Security, Cryptology and Mathematics, Kookmin University) Kim, Jihun (Dept. of Financial Information Security, Kookmin University) Kim, Hangi (Dept. of Financial Information Security, Kookmin University) Kim, Jongsung (Dept. of Information Security, Cryptology and Mathematics, Kookmin University) |
1 | B. Gerard, V. Grosso, Naya-Plasencia, and M. Standaert, F.-X., "Block ciphers that are easier to mask: how far can we go?" In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 383-399, Aug 2013 |
2 | S. Rasoolzadeh, Z. Ahmadian and M. Salmasizadeh, Aref, M.R. "Total break of Zorro using linear and differential attacks." IACR Cryptology ePrint Archive, 220, Jine. 2014. |
3 | B. Preneel, R. Govaerts and J. Vande walle "Hash functions based on block ciphers: A synthetic approach." In: Advances in Cryptology - Proceedings of CRYPTO'93, LNCS 773. Springer, pp 368-378, July. 2001 |
4 | J. Black, P. Rogaway and T. Shrimpton, "Black-box analysis of the block-cip her-based hash-function constructions from pgv." In: Advances in Cryptology - Proceedings of CRYPTO '02, LNCS 2442. Springer, pp 320-335, Sep. 2002 |
5 | H. Kim, D. Kim, O. Yi and J. Kim "Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security" - Multimedia Tools and Applications in Springer, pp 1-24, Mar. 2018 |