GIFT
From MaRDI portal
Cited in
(59)- An STP-based model toward designing S-boxes with good cryptographic properties
- SPEEDY on Cortex-M3: efficient software implementation of SPEEDY on ARM Cortex-M3
- Blockcipher-based authenticated encryption: how small can we go?
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Thinking outside the superbox
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis
- CLEFIA
- ChaCha
- Rumba20
- ARMADILLO
- PRESENT
- spongent
- AEGIS
- NOEKEON
- PHOTON
- tweakey
- Piccolo
- PRINCE
- SIMECK
- SIMON
- KTANTAN
- Midori
- SKINNY
- Atomic-AES
- LED
- Lilliput
- ELmD
- McOE
- MANTIS
- SAFER
- Serpent
- PRINTcipher
- CryptoSMT
- Square
- DLCT
- SPECK
- bitslice-masking-multiplication
- Kuznyechik
- Modeling for three-subset division property without unknown subset
- A first-order SCA resistant AES without fresh randomness
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- SAND
- Gimli
- CRAFT
- QARMA
- Romulus
- Orthros
- Remus
- RoadRunneR
- SM4
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- ISAP
- ARIA-Blocks-Qiskit
- PIPO
- On the existence and non-existence of some classes of bent-negabent functions
- Saturnin
- ForkAE
- SPEEDY
This page was built for software: GIFT