The LED Block Cipher
From MaRDI portal
Publication:3172972
DOI10.1007/978-3-642-23951-9_22zbMath1291.94092OpenAlexW2141124495MaRDI QIDQ3172972
Jian Guo, Axel Poschmann, Matthew J. B. Robshaw, Thomas Peyrin
Publication date: 7 October 2011
Published in: Cryptographic Hardware and Embedded Systems – CHES 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-23951-9_22
Related Items (90)
Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layers ⋮ Construction of higher-level MDS matrices in nested SPNs ⋮ Related-key analysis of generalized Feistel networks with expanding round functions ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ LHash: A Lightweight Hash Function ⋮ Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers ⋮ Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ Cryptanalysis of Full Sprout ⋮ Key recovery attacks on iterated Even-Mansour encryption schemes ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ New observations on invariant subspace attack ⋮ Beyond quadratic speedups in quantum attacks on symmetric schemes ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications ⋮ Reflection Cryptanalysis of PRINCE-Like Ciphers ⋮ Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ A Higher Order Key Partitioning Attack with Application to LBlock ⋮ Higher-Order Glitch Resistant Implementation of the PRESENT S-Box ⋮ On the existence of special nonlinear invariants for round functions of XSL-ciphers ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures ⋮ The DBlock family of block ciphers ⋮ Energy consumption of protected cryptographic hardware cores. An experimental study ⋮ Construction of recursive MDS matrices using DLS matrices ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ Cryptanalysis of reduced round SPEEDY ⋮ A theoretical analysis of generalized invariants of bijective S-boxes ⋮ Design Strategies for ARX with Provable Bounds: Sparx and LAX ⋮ Convexity of division property transitions: theory, algorithms and compact models ⋮ Tight security for key-alternating ciphers with correlated sub-keys ⋮ Analyzing masked ciphers against transition and coupling effects ⋮ Four by four MDS matrices with the fewest XOR gates based on words ⋮ Quantum attacks on beyond-birthday-bound MACs ⋮ Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) ⋮ Hold your breath, PRIMATEs are lightweight ⋮ Twin column parity mixers and Gaston. A new mixing layer and permutation ⋮ A single-key attack on the full GOST block cipher ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Tight security analysis of 3-round key-alternating cipher with a single permutation ⋮ Improved security analysis for nonce-based enhanced hash-then-mask MACs ⋮ Cryptanalysis of masked ciphers: a not so random idea ⋮ Impossible Differentials of SPN Ciphers ⋮ A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock ⋮ Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 ⋮ Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes ⋮ On circulant involutory MDS matrices ⋮ Some results on Fruit ⋮ Almost involutory recursive MDS diffusion layers ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Improved cryptanalysis of AES-like permutations ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Lightweight MDS Generalized Circulant Matrices ⋮ On the Construction of Lightweight Circulant Involutory MDS Matrices ⋮ Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE ⋮ A Fault Attack on the LED Block Cipher ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives ⋮ Reflection ciphers ⋮ On the direct construction of recursive MDS matrices ⋮ Towards a general construction of recursive MDS diffusion layers ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Making the impossible possible ⋮ Minimizing the two-round Even-Mansour cipher ⋮ Truncated differential based known-key attacks on round-reduced SIMON ⋮ The resistance of PRESENT-80 against related-key differential attacks ⋮ Slidex attacks on the Even-Mansour encryption scheme ⋮ Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Nonlinear diffusion layers ⋮ Perfect nonlinear functions and cryptography ⋮ Reflection cryptanalysis of PRINCE-like ciphers ⋮ Exploring Energy Efficiency of Lightweight Block Ciphers ⋮ Полное описание одного класса MDS-матриц над конечным полем характеристики 2 ⋮ New slide attacks on almost self-similar ciphers ⋮ Tight security bounds for double-block hash-then-sum MACs ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ ON A NEW CIPHER SYSTEM OVER GALOIS FIELDS OF ORDER 27 ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices ⋮ Quantum generic attacks on key-alternating Feistel ciphers for shorter keys ⋮ Efficient recursive diffusion layers for block ciphers and hash functions ⋮ Improved BV-based quantum attack on block ciphers
Uses Software
This page was built for publication: The LED Block Cipher