Explore a comprehensive analysis of related-key attacks against the full Hummingbird-2 cryptographic algorithm in this 24-minute talk presented by Markku-Juhani Olavi Saarinen at FSE 2013. Delve into the vulnerabilities of this lightweight encryption scheme and gain insights into potential security risks. Examine the methodology used to identify weaknesses and understand the implications for implementing Hummingbird-2 in secure systems.
Overview
Syllabus
Related-Key Attacks Against Full Hummingbird-2
Taught by
TheIACR