Table of Contents

SCREAM

The Algorithm

Cryptanalysis

Type Reference
Forgery Sim and Wang 1)
Weak keys Leander, Minaud, and Rønjom 2)

2) A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro