LED
From MaRDI portal
Cited in
(only showing first 100 items - show all)- On related-key attacks and KASUMI: the case of A5/3
- Construction of higher-level MDS matrices in nested SPNs
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- Analyzing permutations for AES-like ciphers: understanding shiftrows
- A very compact FPGA implementation of LED and PHOTON
- Wide Trail Design Strategy for Binary MixColumns
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Minimizing the two-round Even-Mansour cipher
- Efficient recursive diffusion layers for block ciphers and hash functions
- Полное описание одного класса MDS-матриц над конечным полем характеристики 2
- On a new cipher system over Galois fields of order 27
- Provable one-XOR matrices for construction of \(4 \times 4\) hardware-oriented MDS diffusion layers
- On circulant involutory MDS matrices
- Some results on Fruit
- New observations on invariant subspace attack
- More accurate division property propagations based on optimized implementations of linear layers
- A single-key attack on the full GOST block cipher
- Tight security analysis of 3-round key-alternating cipher with a single permutation
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- Making the impossible possible
- Impossible differentials of SPN ciphers
- FreePDK45
- maskVerif
- The resistance of PRESENT-80 against related-key differential attacks
- SPEEDY
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Nonlinear diffusion layers
- Cryptanalysis of masked ciphers: a not so random idea
- Minimizing the two-round tweakable Even-Mansour cipher
- Fruit
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Remus
- RoadRunneR
- Slidex attacks on the Even-Mansour encryption scheme
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Chaskey
- QARMA
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- The DBlock family of block ciphers
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Blockcipher-based authenticated encryption: how small can we go?
- Perfect nonlinear functions and cryptography
- Reflection cryptanalysis of PRINCE-like ciphers
- The LED block cipher
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Known-key distinguisher on full \(\mathtt{PRESENT}\)
- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
- Cryptanalysis of full sprout
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Fish
- CLEFIA
- Trivium
- LBlock
- Whirlwind
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- HIGHT
- Quark
- spongent
- AEGIS
- Camellia
- mCrypton
- MICKEY
- NOEKEON
- Keccak
- TWINE
- EPCBC
- PHOTON
- ICEBERG
- NanGate
- Piccolo
- PRINCE
- DBlock
- FOX
- Whirlpool
- SIMECK
- KTANTAN
- Midori
- SKINNY
- SHARK
- Espresso
- Atomic-AES
- Lilliput
- ELmD
- MANTIS
- PICARO
- KATAN
- CRYPTON
- MISTY
- PRINTcipher
This page was built for software: LED