scientific article; zbMATH DE number 1455096
From MaRDI portal
Publication:4484891
zbMATH Open0939.94550MaRDI QIDQ4484891FDOQ4484891
Authors: David J. Wheeler, Roger M. Needham
Publication date: 5 June 2000
Title of this publication is not available (Why is that?)
Cited In (37)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- On the implementation efficiency of linear regression-based side-channel attacks
- Title not available (Why is that?)
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- The Hash Function Family LAKE
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Related-Key Cryptanalysis of Midori
- Differential Cryptanalysis of Reduced-Round PRESENT
- Arithmetic Addition over Boolean Masking
- A Unified Approach to Related-Key Attacks
- A bit-vector differential model for the modular addition by a constant
- The Missing Difference problem, and its applications to counter mode encryption
- Zero-correlation attacks: statistical models independent of the number of approximations
- Analysis of bitsum attack on block ciphers
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Pseudo-random number generation for Brownian dynamics and dissipative particle dynamics simulations on GPU devices
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Verifying constant-time implementations by abstract interpretation
- TEA
- Software obfuscation with non-linear mixed Boolean-arithmetic expressions
- Revisiting key schedule's diffusion in relation with round function's diffusion
- A single-key attack on the full GOST block cipher
- Sliding encryption: a cryptographic tool for mobile agents
- Formal verification for high-assurance behavioral synthesis
- Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- LBlock: a lightweight block cipher
- Meet-in-the-middle attacks on reduced-round XTEA
- Proof producing synthesis of arithmetic and cryptographic hardware
- \(\mathsf{xmx}\): a firmware-oriented block cipher based on modular multiplications
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484891)