LBlock
From MaRDI portal
Software:18661
swMATH6569MaRDI QIDQ18661FDOQ18661
Author name not available (Why is that?)
Cited In (50)
- Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Some results on Fruit
- Biclique cryptanalysis of LBlock and TWINE
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Cryptanalysis of Full Sprout
- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
- A MAC Mode for Lightweight Block Ciphers
- On the Security of the LAC Authenticated Encryption Algorithm
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Cryptanalysis of KLEIN
- Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE
- Making the impossible possible
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Automatic search for bit-based division property
- Algebraic Insights into the Secret Feistel Network
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Key Difference Invariant Bias in Block Ciphers
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- Impossible Differential Attacks on Reduced-Round LBlock
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- A unified method for finding impossible differentials of block cipher structures
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Differential Forgery Attack Against LAC
- Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s
- Biclique Attack of Block Cipher SKINNY
- The DBlock family of block ciphers
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Extended meet-in-the-middle attacks on some Feistel constructions
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Note on Impossible Differential Attacks
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE
- On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher
- The summation-truncation hybrid: reusing discarded bits for free
This page was built for software: LBlock