NOEKEON
From MaRDI portal
Software:21709
swMATH9730MaRDI QIDQ21709FDOQ21709
Author name not available (Why is that?)
Cited In (26)
- On the resilience of Even-Mansour to invariant permutations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Title not available (Why is that?)
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Key recovery attacks on iterated Even-Mansour encryption schemes
- Cryptographic Analysis of All 4 × 4-Bit S-Boxes
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- Exploring Energy Efficiency of Lightweight Block Ciphers
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- New criteria for linear maps in AES-like ciphers
- The design of Rijndael. The Advanced Encryption Standard (AES)
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Improving the security and efficiency of block ciphers based on LS-designs
- Secure hardware implementation of nonlinear functions in the presence of glitches
- On the Distribution of Linear Biases: Three Instructive Examples
- White-Box Cryptography in the Gray Box
- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA
This page was built for software: NOEKEON