CLEFIA
From MaRDI portal
swMATH3047MaRDI QIDQ15580FDOQ15580
Author name not available (Why is that?)
Official website: http://en.wikipedia.org/wiki/CLEFIA
Cited In (only showing first 100 items - show all)
- Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1
- Fruit
- Biclique cryptanalysis of LBlock and TWINE
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Differential analysis of the extended generalized Feistel networks
- Remus
- Parallelizing the Camellia and SMS4 block ciphers
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- QARMA
- Romulus
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- Generalized Feistel networks revisited
- Analysis of \(3\)-line generalized Feistel networks with double SD-functions
- Troika: a ternary cryptographic hash function
- Greedy distinguishers and nonrandomness detectors
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
- On unbalanced feistel networks with contracting MDS diffusion
- A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems
- LBlock
- Whirlwind
- ARIA
- KLEIN
- Rabbit
- ARMADILLO
- PRESENT
- HIGHT
- Camellia
- mCrypton
- MICKEY
- NOEKEON
- SOSEMANUK
- TWINE
- PHOTON
- tweakey
- Piccolo
- PRINCE
- DBlock
- FOX
- BitCryptor
- Whirlpool
- SIMECK
- SIMON
- Twofish
- KTANTAN
- Midori
- SKINNY
- SHARK
- Atomic-AES
- LED
- Itubee
- LEX
- Lilliput
- Skein Hash
- MANTIS
- PICARO
- Serpent
- KATAN
- CRYPTON
- MISTY
- LEA
- PRINTcipher
- Square
- DLCT
- SPECK
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- GIFT
- Edon80
- XTEA
- bitslice-masking-multiplication
- Kuznyechik
- Streebog
- Revised version of block cipher CHAM
- The DBlock family of block ciphers
- Improving the generalized Feistel
- Proposition of two cipher structures
- LBlock: a lightweight block cipher
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- The improbable differential attack: cryptanalysis of reduced round CLEFIA
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- CRAFT
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
- Efficient systolic multiplications in composite fields for cryptographic systems
- RoadRunneR
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Very Compact Hardware Implementations of the Blockcipher CLEFIA
- Impossible Differential Cryptanalysis of CLEFIA
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- Impossible Differential Analysis of Reduced Round CLEFIA
- Polynomial evaluation and side channel analysis
- Making the impossible possible
- The resistance of PRESENT-80 against related-key differential attacks
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
This page was built for software: CLEFIA