SIMON
From MaRDI portal
swMATH13824MaRDI QIDQ25735FDOQ25735
Author name not available (Why is that?)
Official website: https://eprint.iacr.org/2013/404.pdf
Cited In (only showing first 100 items - show all)
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Improving attacks on round-reduced Speck32/64 using deep learning
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Structural evaluation by generalized integral property
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Fault analysis on \textsc{Simon} family of lightweight block ciphers
- Algebraic analysis of the Simon block cipher family
- Differential analysis of block ciphers \textsc{Simon} and \textsc{Speck}
- Observations on the \textsf{SIMON} block cipher family
- Algebraic Differential Fault Analysis on SIMON Block Cipher
- Related-key almost universal hash functions: definitions, constructions and applications
- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
- Salsa20
- Trivium
- Barreto-Naehrig
- LBlock
- ChaCha
- Rumba20
- ARIA
- KLEIN
- dieharder
- PRESENT
- HIGHT
- Ent
- spongent
- ARXtools
- Camellia
- mCrypton
- NOEKEON
- Keccak
- SipHash
- CryptoMiniSat
- RELIC
- TWINE
- BLAKE
- EPCBC
- eSTREAM
- PHOTON
- ICEBERG
- tweakey
- Piccolo
- PRINCE
- FOX
- BitCryptor
- Whirlpool
- SIMECK
- HiTag2
- OR-tools
- STR2
- KTANTAN
- Midori
- SKINNY
- Transalg
- Atomic-AES
- LED
- ASC-1
- Itubee
- Grain
- LEX
- Lilliput
- ELmD
- Skein Hash
- McOE
- MANTIS
- MacGuffin
- PICARO
- SAFER
- Serpent
- KATAN
- CRYPTON
- MISTY
- Sage S-box MILP toolkit
- CHAM
- LEA
- PRINTcipher
- YAARX
- CryptoSMT
- Square
- Bel-T
- ATHENa
- DLCT
- LowMC
- deep_speck
- Picnic
- SPECK
- TEA
- GIFT
- Kyber
- XTEA
- bitslice-masking-multiplication
- A comparison of the homomorphic encryption schemes FV and YASHE
- Meet-in-the-middle attacks on generic Feistel constructions
- Cryptanalysis of \textsc{FlexAEAD}
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
- Perfect nonlinear functions and cryptography
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Integral attacks on round-reduced Bel-T-256
- A preimage attack on reduced \textsc{Gimli}-\textsc{Gash}
- An STP-based model toward designing S-boxes with good cryptographic properties
This page was built for software: SIMON