The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
From MaRDI portal
Publication:2829213
DOI10.1007/978-3-662-53008-5_5zbMATH Open1372.94412OpenAlexW2504919933MaRDI QIDQ2829213FDOQ2829213
Stefan Kölbl, Yu Sasaki, Thomas Peyrin, Jérémy Jean, Christof Beierle, Pascal Sasdrich, Siang Meng Sim, Amir Moradi, Gregor Leander
Publication date: 27 October 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_5
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Piccolo: An Ultra-Lightweight Blockcipher
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- PRESENT: An Ultra-Lightweight Block Cipher
- The LED Block Cipher
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- The block cipher Square
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Reflection ciphers
- Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks
- Observations on the SIMON Block Cipher Family
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Midori: A Block Cipher for Low Energy
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
- Implementing Lightweight Block Ciphers on x86 Architectures
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- How to Protect DES Against Exhaustive Key Search
- Memory encryption
Cited In (only showing first 100 items - show all)
- An STP-based model toward designing S-boxes with good cryptographic properties
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys
- Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes
- Computing AES related-key differential characteristics with constraint programming
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Finding integral distinguishers with ease
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- Block cipher invariants as eigenvectors of correlation matrices
- Strong and tight security guarantees against integral distinguishers
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- Improved (related-key) differential cryptanalysis on GIFT
- Nonce-misuse security of the SAEF authenticated encryption mode
- PRINCEv2. More security for (almost) no overhead
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Security analysis of SIMECK block cipher against related-key impossible differential
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- LLLWBC: a new low-latency light-weight block cipher
- Implementing Grover oracle for lightweight block ciphers under depth constraints
- Linearly equivalent s-boxes and the division property
- Lightweight authenticated encryption mode suitable for threshold implementation
- TNT: how to tweak a block cipher
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- Tight security of cascaded LRW2
- Blockcipher-based authenticated encryption: how small can we go?
- RAMus- a new lightweight block cipher for RAM encryption
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- DEFAULT: cipher level resistance against differential fault attack
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- New observations on invariant subspace attack
- More accurate division property propagations based on optimized implementations of linear layers
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
- \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security
- Transparency order of \((n, m)\)-functions -- its further characterization and applications
- Provably secure reflection ciphers
- The \texttt{Deoxys} AEAD family
- Lower bounds on the degree of block ciphers
- Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Leakage resilient value comparison with application to message authentication
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- Exploring lightweight efficiency of ForkAES
- On the relationship between resilient Boolean functions and linear branch number of S-boxes
- Analyzing masked ciphers against transition and coupling effects
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- SILVER -- statistical independence and leakage verification
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem
- Block cipher invariants as eigenvectors of correlation matrices
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- Bounding the length of impossible differentials for SPN block ciphers
- Differential uniformity and linearity of S-boxes by multiplicative complexity
- Related-Key Impossible-Differential Attack on Reduced-Round Skinny
- The summation-truncation hybrid: reusing discarded bits for free
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Differential meet-in-the-middle cryptanalysis
- On perfect linear approximations and differentials over two-round SPNs
- Weak subtweakeys in SKINNY
- Full round distinguishing and key-recovery attacks on SAND-2
- Improved attacks on \texttt{GIFT-64}
- \textsf{LightMAC}: fork it and make it faster
- On some properties of the curvature and nondegeneracy of Boolean functions
- Partition and mix: generalizing the swap-or-not shuffle
- Forced Independent Optimized Implementation of 4-Bit S-Box
- Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count
- A forkcipher-based pseudo-random number generator
- An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros
- Offset-based BBB-secure tweakable block-ciphers with updatable caches
- On the Efficiency of ZMAC-Type Modes
- Designing S-boxes providing stronger security against differential cryptanalysis for ciphers using byte-wise XOR
- Parallel verification of serial MAC and AE modes
- Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}
- Finding all impossible differentials when considering the DDT
- Optimizing the depth of quantum implementations of linear layers
- Double-block-length hash function for minimum memory size
- Parallel SAT framework to find clustering of differential characteristics and its applications
- Threshold implementations with non-uniform inputs
- Towards minimizing tweakable blockcipher-based generalized Feistel networks
- \textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
- Improved heuristics for low-latency implementations of linear layers
- Lightweight leakage-resilient PRNG from TBCs using superposition
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layers
- Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Key structures: improved related-key boomerang attack against the full AES-256
- Energy consumption of protected cryptographic hardware cores. An experimental study
- Triangulating rebound attack on AES-like hashing
- Secret can be public: low-memory AEAD mode for high-order masking
- Improved differential meet-in-the-middle cryptanalysis
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
Uses Software
Recommendations
- The \textsf{Simeck} family of lightweight block ciphers 👍 👎
- KLEIN: A New Family of Lightweight Block Ciphers 👍 👎
- Biclique Attack of Block Cipher SKINNY 👍 👎
- Cryptanalysis of \texttt{SKINNY} in the framework of the \texttt{SKINNY} 2018--2019 cryptanalysis competition 👍 👎
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers 👍 👎
- Midori: A Block Cipher for Low Energy 👍 👎
- PRESENT: An Ultra-Lightweight Block Cipher 👍 👎
- On the Key Schedule of Lightweight Block Ciphers 👍 👎
- LLLWBC: a new low-latency light-weight block cipher 👍 👎
This page was built for publication: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829213)