Piccolo
From MaRDI portal
Software:25157
swMATH13242MaRDI QIDQ25157FDOQ25157
Author name not available (Why is that?)
Cited In (55)
- Title not available (Why is that?)
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- Cube Cryptanalysis of LBlock with Noisy Leakage
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Correlation power analysis of lightweight block ciphers: from theory to practice
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Blockcipher-based authenticated encryption: how small can we go?
- Lightweight cryptography for the cloud: exploit the power of bitslice implementation
- Improved multidimensional zero-correlation linear cryptanalysis and applications to lblock and TWINE
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Provable related-key security of contracting Feistel networks
- Implementing lightweight block ciphers on \texttt{x86} architectures
- The resistance of PRESENT-80 against related-key differential attacks
- Exploring energy efficiency of lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- Comprehensive study of integral analysis on 22-round LBlock
- Troika: a ternary cryptographic hash function
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Automatic search of truncated impossible differentials for word-oriented block ciphers
- Cryptanalysis of reduced-round SIMON32 and SIMON48
- Security analysis of the lightweight block ciphers XTEA, LED and Piccolo
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- Automatic search of meet-in-the-middle and impossible differential attacks
- A MAC mode for lightweight block ciphers
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
- Hashing mode using a lightweight blockcipher
- Biclique cryptanalysis of reduced-round Piccolo block cipher
- Double-SP is weaker than single-SP: rebound attacks on Feistel ciphers with several rounds
- The DBlock family of block ciphers
- A single-key attack on the full GOST block cipher
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Towards Green cryptography: a comparison of lightweight ciphers from the energy viewpoint
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI
- Optimizing S-Box Implementations for Several Criteria Using SAT Solvers
- On the security of Piccolo lightweight block cipher against related-key impossible differentials
- Extended meet-in-the-middle attacks on some Feistel constructions
- Espresso: a stream cipher for 5G wireless communication systems
- Generic key recovery attack on Feistel scheme
- Differential analysis of the LED block cipher
- Meet-in-the-middle attacks on generic Feistel constructions
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Authenticated encryption: how reordering can impact performance
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- Bitsliced masking and ARM: friends or foes?
- Block cipher speed and energy efficiency records on the MSP430: system design trade-offs for 16-bit embedded applications
- The summation-truncation hybrid: reusing discarded bits for free
- Truncated differential based known-key attacks on round-reduced SIMON
This page was built for software: Piccolo