Table of Contents
Wheesht
The Algorithm
Cryptanalysis
Wheesht
The Algorithm
Author(s): Peter Maxwell
CAESAR submission:
Wheesht
Location
Cryptanalysis
Type
Nonce
Queries
Data
Time
Success probability
Reference
Forgery
$1$
$1$
Neves
on newsgroup
Distinguisher
$2^{70.3}$
Canteaut and Leurent
1)
(Encryption) key recovery
$2^{10}$
$2^{200}$
Canteaut and Leurent
2)
1)
,
2)
Distinguishing and Key-recovery Attacks against Wheesht