HIGHT: A New Block Cipher Suitable for Low-Resource Device
From MaRDI portal
Publication:3522151
DOI10.1007/11894063_4zbMATH Open1307.94058OpenAlexW1522919234MaRDI QIDQ3522151FDOQ3522151
Changhoon Lee, Donghoon Chang, Deukjo Hong, Hyun Jeong Kim, Kitae Jeong, Sang-Jin Lee, Jongsung Kim, Seokhie Hong, Jesang Lee, Bonseok Koo, Jaechul Sung, Jong-In Lim, Seongtaek Chee
Publication date: 29 August 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11894063_4
Recommendations
Cited In (58)
- ON A NEW CIPHER SYSTEM OVER GALOIS FIELDS OF ORDER 27
- New automatic search tool for searching for impossible differentials using undisturbed bits
- Обобщенные квази-адамаровы преобразования на конечных группах
- Generalized Feistel ciphers for efficient prime field masking
- Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks
- Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
- Automatic tool for searching for differential characteristics in ARX ciphers and applications
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- Parallel quantum addition for Korean block ciphers
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
- A MAC Mode for Lightweight Block Ciphers
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006
- LBlock: A Lightweight Block Cipher
- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- ALE: AES-Based Lightweight Authenticated Encryption
- LHash: A Lightweight Hash Function
- Cryptographic properties of cyclic binary matrices
- Generalized Feistel networks revisited
- Differential Cryptanalysis of Reduced-Round PRESENT
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Troika: a ternary cryptographic hash function
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
- A bit-vector differential model for the modular addition by a constant
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Exploring Energy Efficiency of Lightweight Block Ciphers
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Generalized MitM attacks on full TWINE
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
- On the diffusion of the improved generalized Feistel
- Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
- A Fault Attack on the LED Block Cipher
- Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere
- Improved differential attack on round-reduced LEA
- The DBlock family of block ciphers
- Hash Functions and RFID Tags: Mind the Gap
- Side-channel resistant crypto for less than 2,300 GE
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- The summation-truncation hybrid: reusing discarded bits for free
- Truncated differential based known-key attacks on round-reduced SIMON
Uses Software
This page was built for publication: HIGHT: A New Block Cipher Suitable for Low-Resource Device
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3522151)