Table of Contents

π-Cipher

The Algorithm

Cryptanalysis

Type Data Memory Time Reference
Tag second-preimage attack, $\omega = 16$ $2^{11}$ $2^{11}$ $2^{22}$ Leurent 1)
Tag second-preimage attack, $\omega = 32$ $2^{16}$ $2^{15}$ $2^{31}$ Leurent 2)
Tag second-preimage attack, $\omega = 64$ $2^{22}$ $2^{23}$ $2^{45}$ Leurent 3)
Forgery due to padding weakness Fuhr and Leurent on Cryptographic Competitions