CLEFIA
From MaRDI portal
Cited in
(only showing first 100 items - show all)- Probably secure keyed-function based authenticated encryption schemes for big data
- Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited
- On maximum differential probability of generalized Feistel
- Automatic search of meet-in-the-middle and impossible differential attacks
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- A MAC mode for lightweight block ciphers
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- SAND
- CRAFT
- QARMA
- Romulus
- Fruit
- Remus
- RoadRunneR
- Revised version of block cipher CHAM
- The DBlock family of block ciphers
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Cryptanalysis of full sprout
- Applications of Simon's algorithm in quantum attacks on Feistel variants
- Multiset structural attack on generalized Feistel networks
- On the multiplicative complexity of Boolean functions and bitsliced higher-order masking
- Improving the generalized Feistel
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Structural evaluation for generalized Feistel structures and applications to LBlock and TWINE
- Differential property of \textsc{Present}-like structure
- Proposition of two cipher structures
- LBlock: a lightweight block cipher
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- The improbable differential attack: cryptanalysis of reduced round CLEFIA
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- ForkAE
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1
- Efficient systolic multiplications in composite fields for cryptographic systems
- Biclique cryptanalysis of LBlock and TWINE
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Differential analysis of the extended generalized Feistel networks
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Very Compact Hardware Implementations of the Blockcipher CLEFIA
- Parallelizing the Camellia and SMS4 block ciphers
- Impossible Differential Cryptanalysis of CLEFIA
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- Impossible Differential Analysis of Reduced Round CLEFIA
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- Polynomial evaluation and side channel analysis
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Making the impossible possible
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- The resistance of PRESENT-80 against related-key differential attacks
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Constructing lightweight optimal diffusion primitives with Feistel structure
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher
- Generalized Feistel networks revisited
- Analysis of 3-line generalized Feistel networks with double SD-functions
- Saturation Attack on the Block Cipher HIGHT
- Troika: a ternary cryptographic hash function
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Cache timing attacks on Clefia
- Greedy distinguishers and nonrandomness detectors
- Cryptanalysis of CLEFIA using differential methods with cache trace patterns
- On the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\)
- Fish
- SC2000
- LITESET
- NESSIE
- KASUMI
- LBlock
- Whirlwind
- ARIA
- KLEIN
- Rabbit
- ARMADILLO
- PRESENT
- HIGHT
- Camellia
- mCrypton
- MICKEY
- NOEKEON
- SOSEMANUK
- TWINE
- PHOTON
- tweakey
- Piccolo
- PRINCE
- DBlock
- FOX
- BitCryptor
- Whirlpool
- SIMECK
- SIMON
- Twofish
This page was built for software: CLEFIA