Cryptanalysis of plantlet

S Banik, K Barooti, T Isobe - IACR Transactions on Symmetric …, 2019 - infoscience.epfl.ch
… key recovery attack on Plantlet that requires around 276.26 Plantlet encryptions. The attack
… , we are now ready to mathematically describe the cryptanalytic steps. Note that, in the …

Fast correlation attacks on Grain-like small state stream ciphers and cryptanalysis of Plantlet, Fruit-v2 and Fruit-80

S Wang, M Liu, D Lin, L Ma - Cryptology ePrint Archive, 2019 - eprint.iacr.org
… our cryptanalytic techniques to Plantlet, Fruit-v2 and Fruit-80. As a result, for Plantlet our …
our theoretical analysis quite well, which proves the validity of our cryptanalytic techniques. …

On grain-like small state stream ciphers against fast correlation attacks: Cryptanalysis of plantlet, fruit-v2 and fruit-80

S Wang, M Liu, D Lin, L Ma - The Computer Journal, 2023 - academic.oup.com
… apply our cryptanalytic techniques to Plantlet, Fruit-v2 and Fruit-80. As a result, for Plantlet, …
our theoretical analysis quite well, which proves the validity of our cryptanalytic techniques. …

A differential fault attack on plantlet

S Maitra, A Siddhanti, S Sarkar - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… While the designers of Plantlet do not provide any analysis on fault attacks, we note that
Plantlet … In this paper we show that Plantlet is weaker than Sprout in this model of cryptanalysis. …

Atom: a stream cipher with double key filter

S Banik, A Caforio, T Isobe, F Liu, W Meier… - IACR Transactions on …, 2021 - tosc.iacr.org
… Lizard and Plantlet with short internal states. Both these designs have had cryptanalytic results
… Atom uses two key filters simultaneously to thwart certain cryptanalytic attacks that have …

Restricted near collision attack on Plantlet

S Kumar, SK Mondal, S Sarkar, T Isobe, A Baksi… - Journal of Cryptographic …, 2023 - Springer
… Our emphasis in this paper is on Plantlet cipher. The design of Plantlet is similar to Sprout
except at a few points, to overcome … Further cryptanalysis of Sprout has been reported in [13]. …

Design and analysis of small-state grain-like stream ciphers

M Hamann, M Krause, W Meier, B Zhang - Cryptography and …, 2018 - Springer
… In direction of cryptanalysis, while Plantlet has not been … than the basic one used in Plantlet.
Because not only Fruit v1 has … clock cycle as done by Plantlet already seems to do this job. …

Performance analysis of current lightweight stream ciphers for constrained environments

S Deb, B Bhuyan - Sādhanā, 2020 - Springer
… Although a few high-end cryptanalytic attacks on Sprout algorithm are mentioned in the literature
… Specifically, figure 2a illustrates that Lizard, Sprout and Plantlet require remarkably less …

A new approach for Side Channel analysis on stream ciphers and related constructions

A Baksi, S Kumar, S Sarkar - IEEE Transactions on Computers, 2021 - ieeexplore.ieee.org
… For the HD/Reg model with PLANTLET, we can recover internal … topics such as classical
cryptanalysis with automated tools, … His research interests include mathematical cryptanalysis of …

Finding slid pairs for the plantlet stream cipher

J Copeland, L Simpson - … of the Australasian Computer Science Week …, 2020 - dl.acm.org
… for the stream cipher Plantlet. We demonstrate that such slid pairs exist for Plantlet, and that
… For a given key used to generate Plantlet keystreams, we provide a method for generating …