Cited in
(only showing first 100 items - show all)- Block cipher speed and energy efficiency records on the MSP430: system design trade-offs for 16-bit embedded applications
- The summation-truncation hybrid: reusing discarded bits for free
- Orthros
- LLLWBC
- A MAC mode for lightweight block ciphers
- Hashing mode using a lightweight blockcipher
- scientific article; zbMATH DE number 7310284 (Why is no real title available?)
- Cube Cryptanalysis of LBlock with Noisy Leakage
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- ForkAE
- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI
- Biclique cryptanalysis of reduced-round Piccolo block cipher
- SPEEDY
- Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- SAND
- Double-SP is weaker than single-SP: rebound attacks on Feistel ciphers with several rounds
- Authenticated encryption: how reordering can impact performance
- Bitsliced masking and ARM: friends or foes?
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- RoadRunneR
- Cryptanalysis of reduced-round SIMON32 and SIMON48
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- QARMA
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- The DBlock family of block ciphers
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Blockcipher-based authenticated encryption: how small can we go?
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Correlation power analysis of lightweight block ciphers: from theory to practice
- Troika: a ternary cryptographic hash function
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- A single-key attack on the full GOST block cipher
- Security analysis of the lightweight block ciphers XTEA, LED and Piccolo
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- CLEFIA
- LBlock
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- HIGHT
- Quark
- spongent
- AEGIS
- Camellia
- mCrypton
- MICKEY
- NOEKEON
- RAKAPOSHI
- TWINE
- ICEBERG
- NanGate
- PRINCE
- DBlock
- SIMECK
- SIMON
- KTANTAN
- Midori
- SKINNY
- Provable related-key security of contracting Feistel networks
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Espresso
- Atomic-AES
- LED
- Itubee
- Lilliput
- ELmD
- MANTIS
- PICARO
- KATAN
- LEA
- PRINTcipher
- CryptoSMT
- Blowfish
- ATHENa
- SPECK
- Generic key recovery attack on Feistel scheme
- GIFT
- bitslice-masking-multiplication
- Kuznyechik
- Minalpher
- Streebog
- Differential analysis of the LED block cipher
- Lightweight cryptography for the cloud: exploit the power of bitslice implementation
- Implementing lightweight block ciphers on \texttt{x86} architectures
- Meet-in-the-middle attacks on generic Feistel constructions
- LIGHTER-R
- PIPO
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- The resistance of PRESENT-80 against related-key differential attacks
- Comprehensive study of integral analysis on 22-round LBlock
- Truncated differential based known-key attacks on round-reduced SIMON
- Optimizing S-Box Implementations for Several Criteria Using SAT Solvers
This page was built for software: Piccolo