HIGHT: A New Block Cipher Suitable for Low-Resource Device

From MaRDI portal
Revision as of 00:39, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3522151


DOI10.1007/11894063_4zbMath1307.94058MaRDI QIDQ3522151

Changhoon Lee, Donghoon Chang, Deukjo Hong, Hyun Jeong Kim, Kitae Jeong, Sang Jin Lee, Jongsung Kim, Seokhie Hong, Jesang Lee, Bonseok Koo, Jaechul Sung, Jong In Lim, Seongtaek Chee

Publication date: 29 August 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11894063_4


94A60: Cryptography


Related Items

A MAC Mode for Lightweight Block Ciphers, Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE, A Fault Attack on the LED Block Cipher, A survey on implementation of lightweight block ciphers for resource constraints devices, ON A NEW CIPHER SYSTEM OVER GALOIS FIELDS OF ORDER 27, Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006, Hash Functions and RFID Tags: Mind the Gap, Tweakable Pseudorandom Permutation from Generalized Feistel Structure, Обобщенные квази-адамаровы преобразования на конечных группах, Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework, Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks, Improved differential attack on round-reduced LEA, New automatic search tool for searching for impossible differentials using undisturbed bits, A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock, AKF: a key alternating Feistel scheme for lightweight cipher designs, Truncated differential based known-key attacks on round-reduced SIMON, Side-channel resistant crypto for less than 2,300 GE, \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations, WARP: revisiting GFN for lightweight 128-bit block cipher, What is the effective key length for a block cipher: an attack on every practical block cipher, The DBlock family of block ciphers, Generalized MitM attacks on full TWINE, Efficient RFID authentication protocols based on pseudorandom sequence generators, sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives, Generalized Feistel networks revisited, Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK, Cryptographic properties of cyclic binary matrices, Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles, On the diffusion of the improved generalized Feistel, The summation-truncation hybrid: reusing discarded bits for free, Quantum generic attacks on key-alternating Feistel ciphers for shorter keys, Parallel quantum addition for Korean block ciphers, Automatic tool for searching for differential characteristics in ARX ciphers and applications, Troika: a ternary cryptographic hash function, Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard, A bit-vector differential model for the modular addition by a constant, Exploring Energy Efficiency of Lightweight Block Ciphers, One-Key Compression Function Based MAC with Security Beyond Birthday Bound, Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey, Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo, Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher, ALE: AES-Based Lightweight Authenticated Encryption, LBlock: A Lightweight Block Cipher, Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations, On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis, A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN, Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere, Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core, LHash: A Lightweight Hash Function, Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique, An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers, Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers, $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms, Differential Cryptanalysis of Reduced-Round PRESENT, Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents, Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT


Uses Software