SEA: A Scalable Encryption Algorithm for Small Embedded Applications
From MaRDI portal
Publication:3452237
DOI10.1007/11733447_16zbMath1333.94048OpenAlexW1511842436WikidataQ58765344 ScholiaQ58765344MaRDI QIDQ3452237
Neil Gershenfeld, Gilles Piret, Jean-Jacques Quisquater, François-Xavier Standaert
Publication date: 11 November 2015
Published in: Smart Card Research and Advanced Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11733447_16
Related Items
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher ⋮ Rotational Cryptanalysis of Round-Reduced Keccak ⋮ ALE: AES-Based Lightweight Authenticated Encryption ⋮ Type-preserving matrices and security of block ciphers ⋮ Differential Cryptanalysis of Reduced-Round PRESENT ⋮ A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock ⋮ On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions ⋮ Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ LBlock: A Lightweight Block Cipher ⋮ Rotational rebound attacks on reduced Skein ⋮ Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags ⋮ Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT ⋮ Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New types of cryptanalytic attacks using related keys
- Non-Linear Approximations in Linear Cryptanalysis
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- A new approach to block cipher design
- The Wide Trail Design Strategy
- The interpolation attack on block ciphers
- The block cipher Square
- Reinventing the travois: Encryption/MAC in 30 ROM bytes
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Fast Software Encryption
- Fast Software Encryption
This page was built for publication: SEA: A Scalable Encryption Algorithm for Small Embedded Applications