@inproceedings{afcc641f6c014e33a0f6f5591566b10d,
title = "Related-Key Impossible-Differential Attack on Reduced-Round Skinny",
abstract = "At CRYPTO'16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK. SKINNY can be implemented efficiently in both soft- and hardware and supports block sizes of 64 and 128 bits as well as tweakey sizes of 64, 128, 192 and 128, 256, 384 bits respectively. This paper presents a related-tweakey impossible-differential attack on up to 23 (out of 36) rounds of SKINNY-64/128 for different tweak sizes. All our attacks can be trivially extended to SKINNY-128/128.",
keywords = "Symmetric Cryptography, Cryptanalysis, Tweakable block cipher, Impossible differential , Lightweight cryptography ",
author = "Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Sim, {Siang Meng} and Gaoli Wang",
year = "2017",
doi = "10.1007/978-3-319-61204-1_11",
language = "English",
isbn = "978-3-319-61203-4",
volume = "10355",
series = "Lecture Notes in Computer Science",
publisher = "Springer International Publishing",
number = "1",
pages = "208--228",
editor = "Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi",
booktitle = "Applied Cryptography and Network Security",
}