Security and Communication Networks / 2019 / Article / Tab 2

Research Article

Security Cryptanalysis of NUX for the Internet of Things

Table 2

Summary of attacks on NUX.

Attack type Rounds Time Date Memory (Bytes) Reference

Differential 25 - - [12]
29 Section 3.2

Linear 25-- [12]
25 Section 4.2

Distinguishing318 80 Section 5