LBlock
From MaRDI portal
Software:18661
swMATH6569MaRDI QIDQ18661FDOQ18661
Author name not available (Why is that?)
Cited In (50)
- Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Some results on Fruit
- Biclique cryptanalysis of LBlock and TWINE
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Cryptanalysis of Full Sprout
- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
- A MAC Mode for Lightweight Block Ciphers
- On the Security of the LAC Authenticated Encryption Algorithm
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Cryptanalysis of KLEIN
- Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE
- Making the impossible possible
- Improved multidimensional zero-correlation linear cryptanalysis and applications to lblock and TWINE
- On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
- Impossible differential attacks on reduced-round LBlock
- Key difference invariant bias in block ciphers
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Automatic search for bit-based division property
- Algebraic Insights into the Secret Feistel Network
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- A unified method for finding impossible differentials of block cipher structures
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Differential Forgery Attack Against LAC
- Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s
- Biclique cryptanalysis of reduced-round Piccolo block cipher
- Biclique Attack of Block Cipher SKINNY
- The DBlock family of block ciphers
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Extended meet-in-the-middle attacks on some Feistel constructions
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Note on Impossible Differential Attacks
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- The summation-truncation hybrid: reusing discarded bits for free
This page was built for software: LBlock