Research Article

Related-Key Multiple Impossible Differential Cryptanalysis on Full-Round LiCi-2 Designed for IoT

Figure 3

Key recovery attack on 25-round LiCi-2.