scientific article; zbMATH DE number 1455096
From MaRDI portal
Publication:4484891
Cited in
(37)- Construction of lightweight S-boxes using Feistel and MISTY structures
- Differential Cryptanalysis of Reduced-Round PRESENT
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Arithmetic Addition over Boolean Masking
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Pseudo-random number generation for Brownian dynamics and dissipative particle dynamics simulations on GPU devices
- A bit-vector differential model for the modular addition by a constant
- A Unified Approach to Related-Key Attacks
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- Formal verification for high-assurance behavioral synthesis
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- Zero-correlation attacks: statistical models independent of the number of approximations
- Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks
- LBlock: a lightweight block cipher
- Meet-in-the-middle attacks on reduced-round XTEA
- Revisiting key schedule's diffusion in relation with round function's diffusion
- A single-key attack on the full GOST block cipher
- New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA
- The Hash Function Family LAKE
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- Sliding encryption: a cryptographic tool for mobile agents
- The Missing Difference problem, and its applications to counter mode encryption
- TEA
- Analysis of bitsum attack on block ciphers
- \(\mathsf{xmx}\): a firmware-oriented block cipher based on modular multiplications
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Related-Key Cryptanalysis of Midori
- On the implementation efficiency of linear regression-based side-channel attacks
- Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol
- Software obfuscation with non-linear mixed Boolean-arithmetic expressions
- scientific article; zbMATH DE number 7310237 (Why is no real title available?)
- Proof producing synthesis of arithmetic and cryptographic hardware
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Verifying constant-time implementations by abstract interpretation
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484891)