Inproceedings,

Known-Key Attack on GIFT-64 and GIFT-64g0c Based on Correlation Matrices.

, , , and .
ACISP (1), volume 14895 of Lecture Notes in Computer Science, page 20-40. Springer, (2024)

Meta data

Tags

Users

  • @dblp

Comments and Reviews