Research Article
Security Cryptanalysis of NUX for the Internet of Things
Table 2
Summary of attacks on NUX.
| Attack type | Rounds | Time | Date | Memory (Bytes) | Reference |
| Differential | 25 | - | ā | - | [12] | 29 | | | | Section 3.2 |
| Linear | 25 | - | ā | - | [12] | 25 | | | | Section 4.2 |
| Distinguishing | 31 | 8 | 8 | 0 | Section 5 |
|
|