The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
From MaRDI portal
Publication:2946969
DOI10.1007/978-3-319-16363-5_1zbMATH Open1382.94059OpenAlexW1271463297MaRDI QIDQ2946969FDOQ2946969
Authors: Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
Publication date: 18 September 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16363-5_1
Recommendations
- The \textsf{Simeck} family of lightweight block ciphers
- Differential cryptanalysis of round-reduced \textsc{Simon} and \textsc{Speck}
- Improved Differential Cryptanalysis of Round-Reduced Speck
- Differential analysis of block ciphers \textsc{Simon} and \textsc{Speck}
- LBlock: a lightweight block cipher
Cited In (only showing first 100 items - show all)
- Automatic tool for searching for differential characteristics in ARX ciphers and applications
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- On the cost of ASIC hardware crackers: a SHA-1 case study
- The key-dependent message security of key-alternating Feistel ciphers
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Strong and tight security guarantees against integral distinguishers
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- Quantum attacks on Lai-Massey structure
- LLLWBC: a new low-latency light-weight block cipher
- A MAC Mode for Lightweight Block Ciphers
- A deeper look at machine learning-based cryptanalysis
- Grover on \(SIMON\)
- Enhancing differential-neural cryptanalysis
- Blockcipher-based authenticated encryption: how small can we go?
- Improved quantum analysis of SPECK and LowMC
- Thinking outside the superbox
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-128
- Fully automated differential-linear attacks against ARX ciphers
- The Missing Difference problem, and its applications to counter mode encryption
- Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
- Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- Exploring Energy Efficiency of Lightweight Block Ciphers
- Security analysis of subterranean 2.0
- Algebraic Analysis of the Simon Block Cipher Family
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- Linear cryptanalysis of reduced-round SPECK
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Revisiting the wrong-key-randomization hypothesis
- Structural evaluation of AES-like ciphers against mixture differential cryptanalysis
- Exploring lightweight efficiency of ForkAES
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Lightweight MDS Generalized Circulant Matrices
- Extended meet-in-the-middle attacks on some Feistel constructions
- Hold your breath, PRIMATEs are lightweight
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Bit-Based Division Property and Application to Simon Family
- Improved differential-linear attack with application to round-reduced Speck32/64
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- Impossible Differential Attack on Reduced Round SPARX-64/128
- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- Integral attacks on round-reduced Bel-T-256
- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- A white-box speck implementation using self-equivalence encodings
- The summation-truncation hybrid: reusing discarded bits for free
- Improved Top-Down Techniques in Differential Cryptanalysis
- Truncated differential based known-key attacks on round-reduced SIMON
- Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK
- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Improved attacks on \texttt{GIFT-64}
- Lombardi Drawings of Knots and Links
- Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff
- Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications
- Revisiting the security of \textsf{COMET} authenticated encryption scheme
- New automatic search tool for searching for impossible differentials using undisturbed bits
- Clustering effect in \textsc{Simon} and \textsc{Simeck}
- New algorithm for exhausting optimal permutations for generalized Feistel networks
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Correlation cube attack revisited. Improved cube search and superpoly recovery techniques
- Differential-linear approximation semi-unconstrained searching and partition tree: application to LEA and Speck
- More insight on deep learning-aided cryptanalysis
- Implicit white-box implementations: white-boxing ARX ciphers
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
- AES Smaller Than S-Box
- Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers
- Algebraic Insights into the Secret Feistel Network
- From unbalanced to perfect: implementation of low energy stream ciphers
- A survey of elliptic curves for proof systems
- New method for combining Matsui's bounding conditions with sequential encoding method
- Automated truncation of differential trails and trail clustering in ARX
- Weak rotational property and its application
- Monte Carlo tree search for automatic differential characteristics search: application to SPECK
- Massive superpoly recovery with nested monomial predictions
- Pen and Paper Arguments for SIMON and SIMON-like Designs
- Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
- Differential and linear properties of vectorial Boolean functions based on chi
- Categorization of faulty nonce misuse resistant message authentication
- Разностные характеристики основных операций ARX-шифров
Uses Software
This page was built for publication: The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946969)