HIGHT: A New Block Cipher Suitable for Low-Resource Device

From MaRDI portal
Publication:3522151


DOI10.1007/11894063_4zbMath1307.94058MaRDI QIDQ3522151

Sang Jin Lee, Jong In Lim, Seongtaek Chee, Seokhie Hong, Jaechul Sung, Jongsung Kim, Kitae Jeong, Changhoon Lee, Deukjo Hong, Donghoon Chang, Hyun Jeong Kim, Bonseok Koo, Jesang Lee

Publication date: 29 August 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11894063_4


94A60: Cryptography


Related Items

A MAC Mode for Lightweight Block Ciphers, Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE, A Fault Attack on the LED Block Cipher, Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006, Hash Functions and RFID Tags: Mind the Gap, Tweakable Pseudorandom Permutation from Generalized Feistel Structure, A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock, AKF: a key alternating Feistel scheme for lightweight cipher designs, Truncated differential based known-key attacks on round-reduced SIMON, Side-channel resistant crypto for less than 2,300 GE, What is the effective key length for a block cipher: an attack on every practical block cipher, The DBlock family of block ciphers, Generalized MitM attacks on full TWINE, Efficient RFID authentication protocols based on pseudorandom sequence generators, sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives, Generalized Feistel networks revisited, Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard, Exploring Energy Efficiency of Lightweight Block Ciphers, One-Key Compression Function Based MAC with Security Beyond Birthday Bound, Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey, Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo, Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher, ALE: AES-Based Lightweight Authenticated Encryption, LBlock: A Lightweight Block Cipher, Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations, On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis, A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN, Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere, Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core, LHash: A Lightweight Hash Function, Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique, An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers, Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers, $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms, Differential Cryptanalysis of Reduced-Round PRESENT, Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents, Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT


Uses Software