The LED Block Cipher

From MaRDI portal
Publication:3172972

DOI10.1007/978-3-642-23951-9_22zbMath1291.94092OpenAlexW2141124495MaRDI QIDQ3172972

Jian Guo, Axel Poschmann, Matthew J. B. Robshaw, Thomas Peyrin

Publication date: 7 October 2011

Published in: Cryptographic Hardware and Embedded Systems – CHES 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-23951-9_22




Related Items (90)

Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layersConstruction of higher-level MDS matrices in nested SPNsRelated-key analysis of generalized Feistel networks with expanding round functions\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsA survey on implementation of lightweight block ciphers for resource constraints devicesWARP: revisiting GFN for lightweight 128-bit block cipherLHash: A Lightweight Hash FunctionDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like CiphersRecursive Diffusion Layers for (Lightweight) Block Ciphers and Hash FunctionsAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreCryptanalysis of Full SproutKey recovery attacks on iterated Even-Mansour encryption schemesMore accurate division property propagations based on optimized implementations of linear layersNew observations on invariant subspace attackBeyond quadratic speedups in quantum attacks on symmetric schemesGeneralized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTBlock Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded ApplicationsReflection Cryptanalysis of PRINCE-Like CiphersCryptanalysis of Round-Reduced $$\mathtt{LED}$$CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskA Higher Order Key Partitioning Attack with Application to LBlockHigher-Order Glitch Resistant Implementation of the PRESENT S-BoxOn the existence of special nonlinear invariants for round functions of XSL-ciphersBlockcipher-based authenticated encryption: how small can we go?Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasuresThe DBlock family of block ciphersEnergy consumption of protected cryptographic hardware cores. An experimental studyConstruction of recursive MDS matrices using DLS matricesFUTURE: a lightweight block cipher using an optimal diffusion matrixCryptanalysis of reduced round SPEEDYA theoretical analysis of generalized invariants of bijective S-boxesDesign Strategies for ARX with Provable Bounds: Sparx and LAXConvexity of division property transitions: theory, algorithms and compact modelsTight security for key-alternating ciphers with correlated sub-keysAnalyzing masked ciphers against transition and coupling effectsFour by four MDS matrices with the fewest XOR gates based on wordsQuantum attacks on beyond-birthday-bound MACsMinimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules)Hold your breath, PRIMATEs are lightweightTwin column parity mixers and Gaston. A new mixing layer and permutationA single-key attack on the full GOST block cipherBeyond birthday bound secure fresh rekeying: application to authenticated encryptionTight security analysis of 3-round key-alternating cipher with a single permutationImproved security analysis for nonce-based enhanced hash-then-mask MACsCryptanalysis of masked ciphers: a not so random ideaImpossible Differentials of SPN CiphersA related key impossible differential attack against 22 rounds of the lightweight block cipher LBlockMultidimensional meet-in-the-middle attack and its applications to KATAN32/48/64Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modesOn circulant involutory MDS matricesSome results on FruitAlmost involutory recursive MDS diffusion layersAKF: a key alternating Feistel scheme for lightweight cipher designsImproved cryptanalysis of AES-like permutationsA MAC Mode for Lightweight Block CiphersLightweight MDS Generalized Circulant MatricesOn the Construction of Lightweight Circulant Involutory MDS MatricesAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINEA Fault Attack on the LED Block CipherEspresso: a stream cipher for 5G wireless communication systemssLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitivesReflection ciphersOn the direct construction of recursive MDS matricesTowards a general construction of recursive MDS diffusion layersImproving the security and efficiency of block ciphers based on LS-designsMaking the impossible possibleMinimizing the two-round Even-Mansour cipherTruncated differential based known-key attacks on round-reduced SIMONThe resistance of PRESENT-80 against related-key differential attacksSlidex attacks on the Even-Mansour encryption schemeAnalyzing Permutations for AES-like Ciphers: Understanding ShiftRowsImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesNonlinear diffusion layersPerfect nonlinear functions and cryptographyReflection cryptanalysis of PRINCE-like ciphersExploring Energy Efficiency of Lightweight Block CiphersПолное описание одного класса MDS-матриц над конечным полем характеристики 2New slide attacks on almost self-similar ciphersTight security bounds for double-block hash-then-sum MACsWide Trail Design Strategy for Binary MixColumnsON A NEW CIPHER SYSTEM OVER GALOIS FIELDS OF ORDER 27The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsPractical Attack on 8 Rounds of the Lightweight Block Cipher KLEINOn Related-Key Attacks and KASUMI: The Case of A5/3Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS MatricesQuantum generic attacks on key-alternating Feistel ciphers for shorter keysEfficient recursive diffusion layers for block ciphers and hash functionsImproved BV-based quantum attack on block ciphers


Uses Software



This page was built for publication: The LED Block Cipher