Research Article

Security Cryptanalysis of NUX for the Internet of Things

Table 2

Summary of attacks on NUX.

Attack type Rounds Time Date Memory (Bytes) Reference

Differential 25 -ā€‰ - [12]
29 Section 3.2

Linear 25-ā€‰- [12]
25 Section 4.2

Distinguishing318 80 Section 5