647
Views
25
CrossRef citations to date
0
Altmetric
Original Articles

Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo

, &
Pages 2564-2580 | Received 20 Aug 2012, Accepted 10 Jan 2013, Published online: 18 Mar 2013

References

  • A. Biryukov and D. Khovratovich, textit>Related-key cryptanalysis of the full AES-192 and AES-256, Advances in Cryptology-ASIACRYPT2009, Lecture Notes in Computer Science 5912, Springer, Berlin, 2009, pp. 1–18.
  • A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique cryptanalysis of the full AES, Advances in Cryptology-ASIACRYPT2011, Lecture Notes in Computer Science 7073, Springer, Berlin, 2011, pp. 344–371.
  • J. Chen, M. Wang, and B. Preneel, Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT, Progress in Cryptology-AFRICACRYPT2012, Lecture Notes in Computer Science 7374, Springer, Berlin, 2012, pp. 117–137.
  • O. Dunkelman, N. Keller, and A. Shamir, A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3g telephony, Advances in Cryptology-CRYPTO2010, Lecture Notes in Computer Science 6223, Springer, Berlin, 2010, pp. 393–410.
  • D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, HIGHT: A new block cipher suitable for low-resource device, Cryptographic Hardware and Embedded Systems-CHES2006, Lecture Notes in Computer Science 4249, Springer, Berlin, 2006, pp. 46–59.
  • D. Hong, B. Koo, and D. Kwon, Biclique attack on the full HIGHT, Information Security and Cryptology-ICISC2011, Lecture Notes in Computer Science 7259, Springer, Berlin, 2012, pp. 365–374.
  • B. Koo, D. Hong, and D. Kwon, Related-key attack on the full HIGHT, Information Security and Cryptology-ICISC2010, Lecture Notes in Computer Science 6829, Springer, Berlin, 2011, pp. 49–67.
  • J. Lu, Cryptanalysis of reduced versions of the hight block cipher from CHES 2006, Information Security and Cryptology-ICISC2007, Lecture Notes in Computer Science 4817, Springer, Berlin, 2007, pp. 11–26.
  • O. Özen, K. Varıcı, C. Tezcan, and Ç. Kocair, Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT, Information Security and Privacy, Lecture Notes in Computer Science 5594, Springer, Berlin, 2009, pp. 90–107.
  • K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita, and T. Shirai, Piccolo: An ultra-lightweight blockcipher, Cryptographic Hardware and Embedded Systems-CHES2011, Lecture Notes in Computer Science 6917, Springer, Berlin, 2011, pp. 342–357.
  • Y. Wang, W. Wu, and X. Yu, Biclique cryptanalysis of reduced-round piccolo block cipher, Information Security Practice and Experience, Lecture Notes in Computer Science 7232, Springer, Berlin, 2012, pp. 337–352.
  • P. Zhang, B. Sun, and C. Li, Saturation attack on the block cipher hight, Cryptology and Network Security, Lecture Notes in Computer Science 5888, Springer, Berlin, 2009, pp. 76–86.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.