The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
From MaRDI portal
Publication:2829213
DOI10.1007/978-3-662-53008-5_5zbMATH Open1372.94412OpenAlexW2504919933MaRDI QIDQ2829213FDOQ2829213
Authors: Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
Publication date: 27 October 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_5
Recommendations
- The \textsf{Simeck} family of lightweight block ciphers
- KLEIN: a new family of lightweight block ciphers
- Biclique attack of block cipher \texttt{SKINNY}
- Cryptanalysis of \texttt{SKINNY} in the framework of the \texttt{SKINNY} 2018--2019 cryptanalysis competition
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- \texttt{Midori}: a block cipher for low energy
- PRESENT: An Ultra-Lightweight Block Cipher
- On the key schedule of lightweight block ciphers
- LLLWBC: a new low-latency light-weight block cipher
Cites Work
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Piccolo: An Ultra-Lightweight Blockcipher
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Block ciphers that are easier to mask: how far can we go?
- PRESENT: An Ultra-Lightweight Block Cipher
- The LED block cipher
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Title not available (Why is that?)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Title not available (Why is that?)
- The block cipher \textsc{Square}
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Reflection ciphers
- Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks
- Observations on the \textsf{SIMON} block cipher family
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- \texttt{Midori}: a block cipher for low energy
- Construction of lightweight S-boxes using Feistel and MISTY structures
- FOAM: searching for hardware-optimal SPN structures and components with a fair comparison
- Implementing lightweight block ciphers on \texttt{x86} architectures
- Pushing the limits: a very compact and a threshold implementation of AES
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- How to Protect DES Against Exhaustive Key Search
- Memory encryption: a survey of existing techniques
Cited In (only showing first 100 items - show all)
- An STP-based model toward designing S-boxes with good cryptographic properties
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys
- Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes
- Computing AES related-key differential characteristics with constraint programming
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Finding integral distinguishers with ease
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- Block cipher invariants as eigenvectors of correlation matrices
- Strong and tight security guarantees against integral distinguishers
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- Improved (related-key) differential cryptanalysis on GIFT
- Nonce-misuse security of the SAEF authenticated encryption mode
- PRINCEv2. More security for (almost) no overhead
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Security analysis of SIMECK block cipher against related-key impossible differential
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- LLLWBC: a new low-latency light-weight block cipher
- Related-key impossible-differential attack on reduced-round \textsc{Skinny}
- Implementing Grover oracle for lightweight block ciphers under depth constraints
- Linearly equivalent s-boxes and the division property
- Lightweight authenticated encryption mode suitable for threshold implementation
- TNT: how to tweak a block cipher
- Tight security of cascaded LRW2
- Blockcipher-based authenticated encryption: how small can we go?
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- RAMus- a new lightweight block cipher for RAM encryption
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- DEFAULT: cipher level resistance against differential fault attack
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- New observations on invariant subspace attack
- More accurate division property propagations based on optimized implementations of linear layers
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
- \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security
- Transparency order of \((n, m)\)-functions -- its further characterization and applications
- Provably secure reflection ciphers
- The \texttt{Deoxys} AEAD family
- Lower bounds on the degree of block ciphers
- Impossible differential cryptanalysis of reduced-round \texttt{SKINNY}
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Leakage resilient value comparison with application to message authentication
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Exploring lightweight efficiency of ForkAES
- On the relationship between resilient Boolean functions and linear branch number of S-boxes
- Analyzing masked ciphers against transition and coupling effects
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- SILVER -- statistical independence and leakage verification
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem
- Block cipher invariants as eigenvectors of correlation matrices
- Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- Bounding the length of impossible differentials for SPN block ciphers
- Differential uniformity and linearity of S-boxes by multiplicative complexity
- The summation-truncation hybrid: reusing discarded bits for free
- Provable one-XOR matrices for construction of \(4 \times 4\) hardware-oriented MDS diffusion layers
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Differential meet-in-the-middle cryptanalysis
- On perfect linear approximations and differentials over two-round SPNs
- Weak subtweakeys in SKINNY
- Full round distinguishing and key-recovery attacks on SAND-2
- Improved attacks on \texttt{GIFT-64}
- Impossible differential cryptanalysis of reduced-round tweakable TWINE
- \textsf{LightMAC}: fork it and make it faster
- On some properties of the curvature and nondegeneracy of Boolean functions
- Partition and mix: generalizing the swap-or-not shuffle
- Forced Independent Optimized Implementation of 4-Bit S-Box
- Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count
- A forkcipher-based pseudo-random number generator
- An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros
- Offset-based BBB-secure tweakable block-ciphers with updatable caches
- Biclique attack of block cipher \texttt{SKINNY}
- On the Efficiency of ZMAC-Type Modes
- Designing S-boxes providing stronger security against differential cryptanalysis for ciphers using byte-wise XOR
- Parallel verification of serial MAC and AE modes
- Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}
- Finding all impossible differentials when considering the DDT
- Optimizing the depth of quantum implementations of linear layers
- Double-block-length hash function for minimum memory size
- Parallel SAT framework to find clustering of differential characteristics and its applications
- Threshold implementations with non-uniform inputs
- Towards minimizing tweakable blockcipher-based generalized Feistel networks
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Improved heuristics for low-latency implementations of linear layers
- Lightweight leakage-resilient PRNG from TBCs using superposition
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Key structures: improved related-key boomerang attack against the full AES-256
- Energy consumption of protected cryptographic hardware cores. An experimental study
- Triangulating rebound attack on AES-like hashing
Uses Software
This page was built for publication: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829213)