Midori: A Block Cipher for Low Energy
From MaRDI portal
Publication:2795984
DOI10.1007/978-3-662-48800-3_17zbMath1382.94057OpenAlexW2293947265MaRDI QIDQ2795984
Francesco Regazzoni, Andrey Bogdanov, Takanori Isobe, Subhadeep Banik, Harunaga Hiwatari, Kyoji Shibutani, Toru Akishita
Publication date: 23 March 2016
Published in: Advances in Cryptology – ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48800-3_17
Related Items
Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications ⋮ Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layers ⋮ Related-key analysis of generalized Feistel networks with expanding round functions ⋮ Improved Integral Attack on Generalized Feistel Cipher ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A new non-random property of 4.5-round PRINCE ⋮ PRINCEv2. More security for (almost) no overhead ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ An STP-based model toward designing S-boxes with good cryptographic properties ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ Related-Key Cryptanalysis of Midori ⋮ Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Transparency order of \((n, m)\)-functions -- its further characterization and applications ⋮ New observations on invariant subspace attack ⋮ Exploring lightweight efficiency of ForkAES ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ On the existence of special nonlinear invariants for round functions of XSL-ciphers ⋮ An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros ⋮ Rotational differential-linear cryptanalysis revisited ⋮ XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation ⋮ Nonlinear Invariant Attack ⋮ Improved heuristics for low-latency implementations of linear layers ⋮ Energy consumption of protected cryptographic hardware cores. An experimental study ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ Cryptanalysis of reduced round SPEEDY ⋮ A theoretical analysis of generalized invariants of bijective S-boxes ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ Optimizing the depth of quantum implementations of linear layers ⋮ Four by four MDS matrices with the fewest XOR gates based on words ⋮ Impossible differential cryptanalysis on reduced-round PRINCEcore ⋮ On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes ⋮ From unbalanced to perfect: implementation of low energy stream ciphers ⋮ A new construction for involutions over finite fields ⋮ Boomerang uniformity of popular S-box constructions ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ On degree-\(d\) zero-sum sets of full rank ⋮ The phantom of differential characteristics ⋮ Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis ⋮ Bounding the length of impossible differentials for SPN block ciphers ⋮ Involutory differentially 4-uniform permutations from known constructions ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ Cryptographic properties of cyclic binary matrices ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Nonlinear diffusion layers ⋮ Construction of MDS matrices from generalized Feistel structures ⋮ О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования ⋮ New slide attacks on almost self-similar ciphers ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ A note on the signal-to-noise ratio of \((n, m)\)-functions ⋮ Cryptanalysis results on spook. Bringing full-round shadow-512 to the light ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes ⋮ New Impossible Differential Search Tool from Design and Cryptanalysis Aspects ⋮ Integral characteristics by keyspace partitioning
Uses Software