LED
From MaRDI portal
Cited in
(only showing first 100 items - show all)- Remus
- RoadRunneR
- The DBlock family of block ciphers
- A single-key attack on the full GOST block cipher
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Slidex attacks on the Even-Mansour encryption scheme
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- FreePDK45
- maskVerif
- Cryptanalysis of full sprout
- Espresso: a stream cipher for 5G wireless communication systems
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- The LED block cipher
- Cryptanalysis of masked ciphers: a not so random idea
- Minimizing the two-round tweakable Even-Mansour cipher
- Improving the security and efficiency of block ciphers based on LS-designs
- On the direct construction of recursive MDS matrices
- Reflection ciphers
- Perfect nonlinear functions and cryptography
- SPEEDY
- Truncated differential based known-key attacks on round-reduced SIMON
- Provable one-XOR matrices for construction of \(4 \times 4\) hardware-oriented MDS diffusion layers
- On related-key attacks and KASUMI: the case of A5/3
- On circulant involutory MDS matrices
- Some results on Fruit
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- Minimizing the two-round Even-Mansour cipher
- A very compact FPGA implementation of LED and PHOTON
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Blockcipher-based authenticated encryption: how small can we go?
- Making the impossible possible
- Construction of higher-level MDS matrices in nested SPNs
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- Towards a general construction of recursive MDS diffusion layers
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Known-key distinguisher on full \(\mathtt{PRESENT}\)
- The resistance of PRESENT-80 against related-key differential attacks
- Exploring energy efficiency of lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Improved BV-based quantum attack on block ciphers
- Impossible differentials of SPN ciphers
- Key recovery attacks on iterated Even-Mansour encryption schemes
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- On a new cipher system over Galois fields of order 27
- Efficient recursive diffusion layers for block ciphers and hash functions
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- New observations on invariant subspace attack
- Reflection cryptanalysis of PRINCE-like ciphers
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Fish
- CLEFIA
- Trivium
- LBlock
- Whirlwind
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- HIGHT
- Quark
- spongent
- AEGIS
- Camellia
- mCrypton
- MICKEY
- NOEKEON
- Keccak
- TWINE
- EPCBC
- PHOTON
- ICEBERG
- NanGate
- Piccolo
- PRINCE
- DBlock
- FOX
- Whirlpool
- SIMECK
- KTANTAN
- Midori
- SKINNY
- SHARK
- Espresso
- Atomic-AES
- Lilliput
- ELmD
- MANTIS
- PICARO
- KATAN
- CRYPTON
- MISTY
- PRINTcipher
This page was built for software: LED