Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon

Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and Schläffer) has withstood extensive self and th...

Full description

Bibliographic Details
Main Authors: Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2021-03-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/8835