The following pages link to SIMECK (Q25734):
Displayed 50 items.
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (Q510448) (← links)
- Truncated differential based known-key attacks on round-reduced SIMON (Q522222) (← links)
- Revised version of block cipher CHAM (Q776328) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- CHAM: a family of lightweight block ciphers for resource-constrained devices (Q1641163) (← links)
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions (Q1704202) (← links)
- On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions (Q1718633) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- Security analysis of subterranean 2.0 (Q2043414) (← links)
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (Q2068387) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- A white-box speck implementation using self-equivalence encodings (Q2096645) (← links)
- Improved differential-linear attack with application to round-reduced Speck32/64 (Q2096647) (← links)
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers (Q2102066) (← links)
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) (Q2102073) (← links)
- Thinking outside the superbox (Q2129002) (← links)
- Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis (Q2146092) (← links)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis (Q2161424) (← links)
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis (Q2170083) (← links)
- Revisiting the wrong-key-randomization hypothesis (Q2175215) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- Security analysis of SIMECK block cipher against related-key impossible differential (Q2414040) (← links)
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard (Q2446578) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- A bit-vector differential model for the modular addition by a constant (Q2692348) (← links)
- Lower bounds on the degree of block ciphers (Q2692355) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- Exploring Energy Efficiency of Lightweight Block Ciphers (Q2807203) (← links)
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA (Q2817825) (← links)
- Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques (Q2817827) (← links)
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants (Q2822692) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- Pen and Paper Arguments for SIMON and SIMON-like Designs (Q2827732) (← links)
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks (Q2829214) (← links)
- Meet-in-the-Middle Attacks on Generic Feistel Constructions (Q2938859) (← links)
- Cryptanalysis of Reduced-Round SIMON32 and SIMON48 (Q2945379) (← links)
- Algebraic Analysis of the Simon Block Cipher Family (Q2946447) (← links)
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro (Q2948331) (← links)
- Structural Evaluation by Generalized Integral Property (Q2948332) (← links)
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity (Q2958119) (← links)
- Design Strategies for ARX with Provable Bounds: Sparx and LAX (Q2958134) (← links)
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers (Q2958142) (← links)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not (Q2958149) (← links)
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core (Q3179484) (← links)
- On Linear Hulls and Trails (Q3179489) (← links)
- Вероятностные характеристики разностных и линейных соотношений для неоднородной линейной среды (Q3383053) (← links)
- Разностные характеристики основных операций ARX-шифров (Q3383132) (← links)
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure (Q3457107) (← links)