The LED block cipher
From MaRDI portal
Publication:3172972
DOI10.1007/978-3-642-23951-9_22zbMATH Open1291.94092OpenAlexW2141124495MaRDI QIDQ3172972FDOQ3172972
Authors: Jian Guo, Thomas Peyrin, Axel Poschmann, Matthew J. B. Robshaw
Publication date: 7 October 2011
Published in: Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-23951-9_22
Recommendations
Cited In (only showing first 100 items - show all)
- Provable one-XOR matrices for construction of \(4 \times 4\) hardware-oriented MDS diffusion layers
- On the existence of special nonlinear invariants for round functions of XSL-ciphers
- On related-key attacks and KASUMI: the case of A5/3
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- A fault attack on the LED block cipher
- A very compact FPGA implementation of LED and PHOTON
- A higher order key partitioning attack with application to LBlock
- Construction of higher-level MDS matrices in nested SPNs
- Four by four MDS matrices with the fewest XOR gates based on words
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count
- Impossible differentials of SPN ciphers
- A forkcipher-based pseudo-random number generator
- On a new cipher system over Galois fields of order 27
- Higher-order glitch resistant implementation of the PRESENT S-box
- Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)
- Twin column parity mixers and Gaston. A new mixing layer and permutation
- Convexity of division property transitions: theory, algorithms and compact models
- Полное описание одного класса MDS-матриц над конечным полем характеристики 2
- More accurate division property propagations based on optimized implementations of linear layers
- Parallel implementations of LEA
- Tight security analysis of 3-round key-alternating cipher with a single permutation
- Wide Trail Design Strategy for Binary MixColumns
- Energy consumption of protected cryptographic hardware cores. An experimental study
- Generalized Feistel ciphers for efficient prime field masking
- Tight security for key-alternating ciphers with correlated sub-keys
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- A theoretical analysis of generalized invariants of bijective S-boxes
- Cryptanalysis of masked ciphers: a not so random idea
- Cryptanalysis of reduced round SPEEDY
- On the construction of near-MDS matrices
- Quantum attacks on beyond-birthday-bound MACs
- Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
- Block cipher speed and energy efficiency records on the MSP430: system design trade-offs for 16-bit embedded applications
- Related-key analysis of generalized Feistel networks with expanding round functions
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes
- On circulant involutory MDS matrices
- Some results on Fruit
- Lightweight design choices for LED-like block ciphers
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- A survey on implementation of lightweight block ciphers for resource constraints devices
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Minimizing the two-round Even-Mansour cipher
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- More Results on Shortest Linear Programs
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Blockcipher-based authenticated encryption: how small can we go?
- Making the impossible possible
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- Lightweight MDS generalized circulant matrices
- Towards a general construction of recursive MDS diffusion layers
- New slide attacks on almost self-similar ciphers
- The resistance of PRESENT-80 against related-key differential attacks
- Exploring energy efficiency of lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Improved BV-based quantum attack on block ciphers
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Key recovery attacks on iterated Even-Mansour encryption schemes
- Reflection Cryptanalysis of PRINCE-Like Ciphers
- Efficient recursive diffusion layers for block ciphers and hash functions
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- Reflection cryptanalysis of PRINCE-like ciphers
- New observations on invariant subspace attack
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Analyzing permutations for AES-like ciphers: understanding shiftrows
- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Almost involutory recursive MDS diffusion layers
- Nonlinear diffusion layers
- A MAC mode for lightweight block ciphers
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Tight security bounds for double-block hash-then-sum MACs
- Improved cryptanalysis of AES-like permutations
- CUBE cipher: a family of quasi-involutive block ciphers easy to mask
- Revised version of block cipher CHAM
- The DBlock family of block ciphers
- A single-key attack on the full GOST block cipher
- Analyzing masked ciphers against transition and coupling effects
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Slidex attacks on the Even-Mansour encryption scheme
- Cryptanalysis of full sprout
- On the Construction of Lightweight Circulant Involutory MDS Matrices
- Espresso: a stream cipher for 5G wireless communication systems
- Hold your breath, PRIMATEs are lightweight
- Differential analysis of the LED block cipher
- Improving the security and efficiency of block ciphers based on LS-designs
- On the direct construction of recursive MDS matrices
- Reflection ciphers
- Perfect nonlinear functions and cryptography
- Construction of recursive MDS matrices using DLS matrices
Uses Software
This page was built for publication: The LED block cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3172972)