TWINE
From MaRDI portal
Software:21684
swMATH9705MaRDI QIDQ21684FDOQ21684
Author name not available (Why is that?)
Cited In (39)
- Some results on Fruit
- Biclique cryptanalysis of LBlock and TWINE
- Zero-correlation linear cryptanalysis of reduced-round LBlock
- Differential analysis of the extended generalized Feistel networks
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Cryptanalysis of Full Sprout
- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
- Cryptanalysis of KLEIN
- Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE
- Blockcipher-based authenticated encryption: how small can we go?
- Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- The resistance of PRESENT-80 against related-key differential attacks
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- New criterion for diffusion property and applications to improved GFS and EGFN
- Exploring Energy Efficiency of Lightweight Block Ciphers
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Generalized MitM attacks on full TWINE
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- Key Difference Invariant Bias in Block Ciphers
- On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
- Espresso: a stream cipher for 5G wireless communication systems
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Note on Impossible Differential Attacks
- Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE
- On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Comprehensive Study of Integral Analysis on 22-Round LBlock
- Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds
- Truncated differential based known-key attacks on round-reduced SIMON
This page was built for software: TWINE