[HTML][HTML] Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi

J Hoki, T Isobe, R Ito, F Liu, K Sakamoto - Journal of Information Security …, 2022 - Elsevier
This paper presents distinguishing and key recovery attacks on the reduced-round SNOW-V
and SNOW-Vi, which are stream ciphers proposed for standard encryption schemes for the …

Distinguishing and key recovery attacks on the reduced-round SNOW-V

J Hoki, T Isobe, R Ito, F Liu, K Sakamoto - Australasian Conference on …, 2021 - Springer
This paper proposes distinguishing and key recovery attacks on the reduced-round versions
of the SNOW-V stream cipher. First, we construct a MILP model to search for integral …

Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V

K Sakamoto - Information Security and Privacy: 26th Australasian …, 2021 - books.google.com
This paper proposes distinguishing and key recovery attacks on the reduced-round versions
of the SNOW-V stream cipher. First, we construct a MILP model to search for integral …

Improved guess-and-determine and distinguishing attacks on SNOW-V

J Yang, T Johansson, A Maximov - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-determine
(GnD) attacks against the full version with complexities $2^{384} $ and $2^{378} $, …

A correlation attack on full SNOW-V and SNOW-Vi

Z Shi, C Jin, J Zhang, T Cui, L Ding, Y Jin - … International Conference on …, 2022 - Springer
In this paper, a method for searching correlations between the binary stream of Linear Feedback
Shift Register (LFSR) and the keystream of SNOW-V and SNOW-Vi is presented based …

Guess-and-determine attacks on SNOW-Vi stream cipher

L Jiao, Y Hao, Y Li - Designs, Codes and Cryptography, 2023 - Springer
Recently, a faster variant of SNOW-V, called SNOW-Vi, was proposed for fast enough
performance not only in cloud settings but also on low grade CPUs, in response to the …

[PDF][PDF] Comparative Analysis of SNOW-V, SNOW-Vi, and Rocca Encryption Algorithms for Network Communications

G Corbo, J Molina-Gil - … & Communications for Industry 4.0/5.0, 2024 - researchgate.net
Among the plethora of cryptographic algorithms available, the Rocca cipher and the SNOW-V
cipher (along with its SNOW-Vi extension) have emerged as two prominent and efficient …

[HTML][HTML] (Quantum) Time-Memory-Data Tradeoff Attacks on the SNOW-V Stream Cipher

S Li, Z Liao, Z Wu, Z Wu, L Ding - Symmetry, 2022 - mdpi.com
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. In Proceedings
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi. J. Inf…

Correlation attacks on SNOW-V-like stream ciphers based on a heuristic MILP model

S Ma, C Jin, Z Shi, T Cui, J Guan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
SNOW-V and SNOW-Vi are two new LFSR-based stream ciphers of the SNOW family
designed for the 5G mobile communication system. Correlation attack is a well-known …

Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V

Z Zhou, D Feng, B Zhang - Designs, Codes and Cryptography, 2022 - Springer
Distinguishing and key recovery attacks on the reduced-round SNOW-V were proposed
in [12]. Recently, an automatic method of searching for the linear trails by solving SMT/SAT …