Cryptanalysis of plantlet
… key recovery attack on Plantlet that requires around 276.26 Plantlet encryptions. The attack
… , we are now ready to mathematically describe the cryptanalytic steps. Note that, in the …
… , we are now ready to mathematically describe the cryptanalytic steps. Note that, in the …
Fast correlation attacks on Grain-like small state stream ciphers and cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
S Wang, M Liu, D Lin, L Ma - Cryptology ePrint Archive, 2019 - eprint.iacr.org
… our cryptanalytic techniques to Plantlet, Fruit-v2 and Fruit-80. As a result, for Plantlet our …
our theoretical analysis quite well, which proves the validity of our cryptanalytic techniques. …
our theoretical analysis quite well, which proves the validity of our cryptanalytic techniques. …
On grain-like small state stream ciphers against fast correlation attacks: Cryptanalysis of plantlet, fruit-v2 and fruit-80
S Wang, M Liu, D Lin, L Ma - The Computer Journal, 2023 - academic.oup.com
… apply our cryptanalytic techniques to Plantlet, Fruit-v2 and Fruit-80. As a result, for Plantlet, …
our theoretical analysis quite well, which proves the validity of our cryptanalytic techniques. …
our theoretical analysis quite well, which proves the validity of our cryptanalytic techniques. …
A differential fault attack on plantlet
… While the designers of Plantlet do not provide any analysis on fault attacks, we note that
Plantlet … In this paper we show that Plantlet is weaker than Sprout in this model of cryptanalysis. …
Plantlet … In this paper we show that Plantlet is weaker than Sprout in this model of cryptanalysis. …
Atom: a stream cipher with double key filter
… Lizard and Plantlet with short internal states. Both these designs have had cryptanalytic results
… Atom uses two key filters simultaneously to thwart certain cryptanalytic attacks that have …
… Atom uses two key filters simultaneously to thwart certain cryptanalytic attacks that have …
Restricted near collision attack on Plantlet
… Our emphasis in this paper is on Plantlet cipher. The design of Plantlet is similar to Sprout
except at a few points, to overcome … Further cryptanalysis of Sprout has been reported in [13]. …
except at a few points, to overcome … Further cryptanalysis of Sprout has been reported in [13]. …
Design and analysis of small-state grain-like stream ciphers
… In direction of cryptanalysis, while Plantlet has not been … than the basic one used in Plantlet.
Because not only Fruit v1 has … clock cycle as done by Plantlet already seems to do this job. …
Because not only Fruit v1 has … clock cycle as done by Plantlet already seems to do this job. …
Performance analysis of current lightweight stream ciphers for constrained environments
… Although a few high-end cryptanalytic attacks on Sprout algorithm are mentioned in the literature
… Specifically, figure 2a illustrates that Lizard, Sprout and Plantlet require remarkably less …
… Specifically, figure 2a illustrates that Lizard, Sprout and Plantlet require remarkably less …
A new approach for Side Channel analysis on stream ciphers and related constructions
… For the HD/Reg model with PLANTLET, we can recover internal … topics such as classical
cryptanalysis with automated tools, … His research interests include mathematical cryptanalysis of …
cryptanalysis with automated tools, … His research interests include mathematical cryptanalysis of …
Finding slid pairs for the plantlet stream cipher
J Copeland, L Simpson - … of the Australasian Computer Science Week …, 2020 - dl.acm.org
… for the stream cipher Plantlet. We demonstrate that such slid pairs exist for Plantlet, and that
… For a given key used to generate Plantlet keystreams, we provide a method for generating …
… For a given key used to generate Plantlet keystreams, we provide a method for generating …