Piccolo: An Ultra-Lightweight Blockcipher
DOI10.1007/978-3-642-23951-9_23zbMATH Open1291.94154OpenAlexW153516704MaRDI QIDQ3172974FDOQ3172974
Harunaga Hiwatari, Takanori Isobe, Toru Akishita, Taizo Shirai, Kyoji Shibutani, Atsushi Mitsuda
Publication date: 7 October 2011
Published in: Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-23951-9_23
blockciphergeneralized Feistel networksmeet-in-the-middle attacksrelated-key differential attacksultra-lightweight
Cited In (58)
- Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- What is the effective key length for a block cipher: an attack on every practical block cipher
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- LLLWBC: a new low-latency light-weight block cipher
- A MAC Mode for Lightweight Block Ciphers
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- Blockcipher-based authenticated encryption: how small can we go?
- Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
- New algorithm for exhausting optimal permutations for generalized Feistel networks
- Provable related-key security of contracting Feistel networks
- The resistance of PRESENT-80 against related-key differential attacks
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- LHash: A Lightweight Hash Function
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
- A forkcipher-based pseudo-random number generator
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
- Troika: a ternary cryptographic hash function
- Title not available (Why is that?)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Transparency order of \((n, m)\)-functions -- its further characterization and applications
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- Exploring Energy Efficiency of Lightweight Block Ciphers
- Piccolo
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsuiโs Algorithm 2
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Categorization of faulty nonce misuse resistant message authentication
- On the (im)possibility of improving the round diffusion of generalized Feistel structures
- The DBlock family of block ciphers
- A single-key attack on the full GOST block cipher
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Optimizing S-Box Implementations for Several Criteria Using SAT Solvers
- Extended meet-in-the-middle attacks on some Feistel constructions
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- Espresso: a stream cipher for 5G wireless communication systems
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
- On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Cryptanalysis of reduced round SPEEDY
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher
- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask
- The summation-truncation hybrid: reusing discarded bits for free
- Truncated differential based known-key attacks on round-reduced SIMON
- Robust Encryption, Revisited
- Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count
- From unbalanced to perfect: implementation of low energy stream ciphers
- Probabilistic related-key statistical saturation cryptanalysis
- From substitution box to threshold
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
- Observations on the branch number and differential analysis of SPEEDY
- Flatness and structural analysis for the design of stream ciphers involving hybrid automata
Recommendations
- New Observations on Piccolo Block Cipher ๐ ๐
- On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials ๐ ๐
- LBlock: a lightweight block cipher ๐ ๐
- PRESENT: An Ultra-Lightweight Block Cipher ๐ ๐
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo ๐ ๐
- KLEIN: a new family of lightweight block ciphers ๐ ๐
- Biclique cryptanalysis of reduced-round Piccolo block cipher ๐ ๐
- Security analysis of the lightweight block ciphers XTEA, LED and Piccolo ๐ ๐
- Very Compact Hardware Implementations of the Blockcipher CLEFIA ๐ ๐
This page was built for publication: Piccolo: An Ultra-Lightweight Blockcipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3172974)