CLEFIA
From MaRDI portal
Software:15580
swMATH3047MaRDI QIDQ15580FDOQ15580
Author name not available (Why is that?)
Cited In (68)
- A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box
- Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data
- Very Compact Hardware Implementations of the Blockcipher CLEFIA
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher
- Efficient systolic multiplications in composite fields for cryptographic systems
- Biclique cryptanalysis of LBlock and TWINE
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Differential analysis of the extended generalized Feistel networks
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Cryptanalysis of Full Sprout
- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
- A MAC Mode for Lightweight Block Ciphers
- Impossible Differential Cryptanalysis of CLEFIA
- Impossible Differential Analysis of Reduced Round CLEFIA
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- LBlock: A Lightweight Block Cipher
- Proposition of Two Cipher Structures
- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE
- Improving the Generalized Feistel
- Making the impossible possible
- Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- The resistance of PRESENT-80 against related-key differential attacks
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- Saturation Attack on the Block Cipher HIGHT
- Generalized Feistel networks revisited
- Analysis of \(3\)-line generalized Feistel networks with double SD-functions
- Polynomial Evaluation and Side Channel Analysis
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Troika: a ternary cryptographic hash function
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- On the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\)
- Parallelizing the Camellia and SMS4 Block Ciphers
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- On unbalanced feistel networks with contracting MDS diffusion
- A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems
- Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure
- Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- Revised version of block cipher CHAM
- The DBlock family of block ciphers
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Greedy Distinguishers and Nonrandomness Detectors
- Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns
- Applications of Simon's algorithm in quantum attacks on Feistel variants
- Multiset structural attack on generalized Feistel networks
- On the multiplicative complexity of Boolean functions and bitsliced higher-order masking
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Cache Timing Attacks on Clefia
- Differential property of \textsc{Present}-like structure
- On Maximum Differential Probability of Generalized Feistel
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers
This page was built for software: CLEFIA