Pages that link to "Item:Q3642944"
From MaRDI portal
The following pages link to KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers (Q3642944):
Displaying 50 items.
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures (Q404952) (← links)
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock (Q456064) (← links)
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 (Q458737) (← links)
- AKF: a key alternating Feistel scheme for lightweight cipher designs (Q477688) (← links)
- Espresso: a stream cipher for 5G wireless communication systems (Q505077) (← links)
- Truncated differential based known-key attacks on round-reduced SIMON (Q522222) (← links)
- Grain-like structures with minimal and maximal period sequences (Q831159) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- The DBlock family of block ciphers (Q893839) (← links)
- Generalized MitM attacks on full TWINE (Q894457) (← links)
- Correlation cube attacks: from weak-key distinguisher to key recovery (Q1648859) (← links)
- Hold your breath, PRIMATEs are lightweight (Q1698631) (← links)
- Some results on Fruit (Q1727353) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Design and analysis of small-state grain-like stream ciphers (Q1749794) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles (Q2057178) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- New general framework for algebraic degree evaluation of NFSR-based cryptosystems (Q2104459) (← links)
- Exploring lightweight efficiency of ForkAES (Q2179412) (← links)
- Blockcipher-based authenticated encryption: how small can we go? (Q2188958) (← links)
- The MILP-aided conditional differential attack and its application to Trivium (Q2227128) (← links)
- An improved degree evaluation method of NFSR-based cryptosystems (Q2243894) (← links)
- On the uniqueness of a type of cascade connection representations for NFSRs (Q2324766) (← links)
- Quark: a lightweight hash (Q2377065) (← links)
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (Q2413618) (← links)
- The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited (Q2701496) (← links)
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher (Q2794511) (← links)
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks (Q2807196) (← links)
- Exploring Energy Efficiency of Lightweight Block Ciphers (Q2807203) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework (Q2817822) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks (Q2829214) (← links)
- The Cryptographic Power of Random Selection (Q2889867) (← links)
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher (Q2889869) (← links)
- Conditional Differential Cryptanalysis of Trivium and KATAN (Q2889871) (← links)
- Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64 (Q2889872) (← links)
- Very Compact Hardware Implementations of the Blockcipher CLEFIA (Q2889877) (← links)
- ALE: AES-Based Lightweight Authenticated Encryption (Q2946890) (← links)
- A Higher Order Key Partitioning Attack with Application to LBlock (Q2947084) (← links)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not (Q2958149) (← links)
- Biclique Attack of Block Cipher SKINNY (Q2980841) (← links)
- LBlock: A Lightweight Block Cipher (Q3011308) (← links)
- Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations (Q3013074) (← links)
- A Single-Key Attack on the Full GOST Block Cipher (Q3013090) (← links)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN (Q3084257) (← links)
- Cryptanalysis of the Light-Weight Cipher A2U2 (Q3104709) (← links)
- Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere (Q3104729) (← links)