Cited in
(99)- The summation-truncation hybrid: reusing discarded bits for free
- Orthros
- LLLWBC
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Differential Forgery Attack Against LAC
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- Algebraic insights into the secret Feistel network
- Biclique cryptanalysis of reduced-round Piccolo block cipher
- Biclique attack of block cipher \texttt{SKINNY}
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- SPEEDY
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- SAND
- Automatic search for bit-based division property
- Fruit
- Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- Construction of lightweight S-boxes using Feistel and MISTY structures
- A MAC mode for lightweight block ciphers
- RoadRunneR
- Note on impossible differential attacks
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- WARP: revisiting GFN for lightweight 128-bit block cipher
- The DBlock family of block ciphers
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- On the security of the LAC authenticated encryption algorithm
- Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- A unified method for finding impossible differentials of block cipher structures
- On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers
- Structural evaluation for generalized Feistel structures and applications to LBlock and TWINE
- Correlation power analysis of lightweight block ciphers: from theory to practice
- Some results on Fruit
- Biclique cryptanalysis of LBlock and TWINE
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- ForkAE
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Cryptanalysis of full sprout
- Fish
- CLEFIA
- ARIA
- KLEIN
- PRESENT
- HIGHT
- spongent
- Camellia
- mCrypton
- MICKEY
- NOEKEON
- TWINE
- EPCBC
- ICEBERG
- tweakey
- Piccolo
- PRINCE
- DBlock
- SIMECK
- SIMON
- KTANTAN
- SKINNY
- Cryptanalysis of KLEIN
- Impossible differential attacks on reduced-round LBlock
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- A survey on implementation of lightweight block ciphers for resource constraints devices
- LED
- Itubee
- Grain
- LEX
- Lilliput
- MANTIS
- PICARO
- KATAN
- CRYPTON
- MISTY
- PRINTcipher
- CryptoSMT
- Blowfish
- Square
- DLCT
- SPECK
- TEA
- XTEA
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- Key difference invariant bias in block ciphers
- Making the impossible possible
- LIGHTER-R
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Automatic search of meet-in-the-middle and impossible differential attacks
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Extended meet-in-the-middle attacks on some Feistel constructions
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Improved multidimensional zero-correlation linear cryptanalysis and applications to lblock and TWINE
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- CRAFT
- AKF: a key alternating Feistel scheme for lightweight cipher designs
This page was built for software: LBlock