SIMON
From MaRDI portal
Cited in
(only showing first 100 items - show all)- An STP-based model toward designing S-boxes with good cryptographic properties
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Computing AES related-key differential characteristics with constraint programming
- Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack
- (Quantum) cryptanalysis of misty schemes
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Linear properties of the round function of \textsc{SIMON} family of block ciphers
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Improving attacks on round-reduced Speck32/64 using deep learning
- Security analysis of SIMECK block cipher against related-key impossible differential
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- Correlation power analysis of lightweight block ciphers: from theory to practice
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Structural evaluation by generalized integral property
- Fault-cube attack on SIMON family of lightweight block ciphers
- The MILP-aided conditional differential attack and its application to Trivium
- Grover on \(SIMON\)
- Blockcipher-based authenticated encryption: how small can we go?
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff
- How to build fully secure tweakable blockciphers from classical blockciphers
- Lightweight MDS generalized circulant matrices
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Impossible differential attack on reduced round SPARX-64/128
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Fault analysis on \textsc{Simon} family of lightweight block ciphers
- Algebraic analysis of the Simon block cipher family
- Differential analysis of block ciphers \textsc{Simon} and \textsc{Speck}
- Observations on the \textsf{SIMON} block cipher family
- Thinking outside the superbox
- Exploring energy efficiency of lightweight block ciphers
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Bit-based division property and application to \textsc{Simon} family
- Bit-sliding: a generic technique for bit-serial implementations of SPN-based primitives. Applications to AES, PRESENT and SKINNY
- Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
- Related-key almost universal hash functions: definitions, constructions and applications
- Algebraic Differential Fault Analysis on SIMON Block Cipher
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Related-Key Cryptanalysis of Midori
- Simon algorithm key-recovery attack on SIMON
- Differential characteristics of base operations in ARX-ciphers
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- A bit-vector differential model for the modular addition by a constant
- On linear hulls and trails
- Biclique attack of block cipher \texttt{SKINNY}
- Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
- CLEFIA
- Salsa20
- Trivium
- Barreto-Naehrig
- LBlock
- ChaCha
- Rumba20
- ARIA
- KLEIN
- dieharder
- PRESENT
- HIGHT
- Ent
- spongent
- ARXtools
- Camellia
- mCrypton
- NOEKEON
- Keccak
- SipHash
- CryptoMiniSat
- RELIC
- TWINE
- BLAKE
- EPCBC
- eSTREAM
- PHOTON
- ICEBERG
- tweakey
- Piccolo
- PRINCE
- FOX
- BitCryptor
- Whirlpool
- SIMECK
- HiTag2
- OR-tools
- STR2
- KTANTAN
- Midori
This page was built for software: SIMON