\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
From MaRDI portal
Publication:831640
Cites work
- scientific article; zbMATH DE number 1722685 (Why is no real title available?)
- scientific article; zbMATH DE number 503238 (Why is no real title available?)
- scientific article; zbMATH DE number 1088930 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1418251 (Why is no real title available?)
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- A Statistical Saturation Attack against the Block Cipher PRESENT
- A fast new DES implementation in software
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- ARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware
- Bit-Pattern Based Integral Attack
- Block ciphers -- focus on the linear layer (feat. PRIDE)
- Block ciphers that are easier to mask: how far can we go?
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Higher-order differential properties of Keccak and Luffa
- Horizontal side-channel attacks and countermeasures on the ISW masking scheme
- How fast can higher-order masking be in software?
- LS-designs: bitslice encryption for efficient masked software implementations
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- PRESENT: An Ultra-Lightweight Block Cipher
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Piccolo: An Ultra-Lightweight Blockcipher
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Randomness complexity of private circuits for multiplication
- Roadrunner: a small and fast bitslice block cipher for low cost 8-bit processors
- Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- The LED block cipher
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Very high order masking: efficient implementation and security evaluation
- \texttt{Midori}: a block cipher for low energy
Cited in
(7)- A further study on bridge structures and constructing bijective S-boxes for low-latency masking
- Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128
- Enhancing the related-key security of \textsf{PIPO} through new key schedules
- Differential fault attack on lightweight block cipher PIPO
- Learning-based side-channel analysis on PIPO
- PIPO
- Quantum linear key-recovery attacks using the QFT
Describes a project that uses
Uses Software
This page was built for publication: \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q831640)