swMATH13823WikidataQ123191660 ScholiaQ123191660MaRDI QIDQ25734FDOQ25734
Author name not available (Why is that?)
Official website: https://eprint.iacr.org/2013/404.pdf
Cited In (only showing first 100 items - show all)
- Remus
- RoadRunneR
- SM4
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Structural evaluation by generalized integral property
- Chaskey
- QARMA
- XooTools
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Lightweight MDS generalized circulant matrices
- Algebraic analysis of the Simon block cipher family
- Observations on the \textsf{SIMON} block cipher family
- Exploring energy efficiency of lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Bit-based division property and application to \textsc{Simon} family
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Monobit Test
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions
- Cryptanalysis of reduced-round SIMON32 and SIMON48
- Salsa20
- Trivium
- Barreto-Naehrig
- LBlock
- ChaCha
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- HIGHT
- Ent
- ARXtools
- Camellia
- mCrypton
- NOEKEON
- SipHash
- TWINE
- BLAKE
- EPCBC
- ICEBERG
- Piccolo
- PRINCE
- SIMON
- STR2
- KTANTAN
- Midori
- SKINNY
- Transalg
- Atomic-AES
- LED
- Itubee
- Lilliput
- Skein Hash
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- MANTIS
- PICARO
- KATAN
- MISTY
- CHAM
- LEA
- YAARX
- CryptoSMT
- Square
- DLCT
- LowMC
- deep_speck
- Picnic
- SPECK
- Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48
- TEA
- GIFT
- Kyber
- XTEA
- bitslice-masking-multiplication
- Revised version of block cipher CHAM
- A comparison of the homomorphic encryption schemes FV and YASHE
- PIPO
- maskVerif
- SWIFFTX
- Improved differential-linear attack with application to round-reduced Speck32/64
- Meet-in-the-middle attacks on generic Feistel constructions
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
- Perfect nonlinear functions and cryptography
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Gimli
- CRAFT
- On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions
- Truncated differential based known-key attacks on round-reduced SIMON
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- libff
- Orthros
- constantine
- SwiftEC
- wasmcurves
- SPEck
This page was built for software: SIMECK