TWINE
From MaRDI portal
Software:21684
swMATH9705MaRDI QIDQ21684FDOQ21684
Author name not available (Why is that?)
Cited In (39)
- Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1
- Some results on Fruit
- Biclique cryptanalysis of LBlock and TWINE
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- Differential analysis of the extended generalized Feistel networks
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- WARP: revisiting GFN for lightweight 128-bit block cipher
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Cryptanalysis of KLEIN
- Blockcipher-based authenticated encryption: how small can we go?
- Diffusion matrices from algebraic-geometry codes with efficient SIMD implementation
- Improved multidimensional zero-correlation linear cryptanalysis and applications to lblock and TWINE
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- Construction of lightweight S-boxes using Feistel and MISTY structures
- On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- The resistance of PRESENT-80 against related-key differential attacks
- Exploring energy efficiency of lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Key difference invariant bias in block ciphers
- Comprehensive study of integral analysis on 22-round LBlock
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- New criterion for diffusion property and applications to improved GFS and EGFN
- Generalized MitM attacks on full TWINE
- Automatic search of meet-in-the-middle and impossible differential attacks
- On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
- Double-SP is weaker than single-SP: rebound attacks on Feistel ciphers with several rounds
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Cryptanalysis of full sprout
- Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
- Espresso: a stream cipher for 5G wireless communication systems
- Note on Impossible Differential Attacks
- Structural evaluation for generalized Feistel structures and applications to LBlock and TWINE
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Truncated differential based known-key attacks on round-reduced SIMON
This page was built for software: TWINE