Cited in
(only showing first 100 items - show all)- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Security analysis of SIMECK block cipher against related-key impossible differential
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- Correlation power analysis of lightweight block ciphers: from theory to practice
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Structural evaluation by generalized integral property
- Lightweight MDS generalized circulant matrices
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Impossible differential attack on reduced round SPARX-64/128
- Algebraic analysis of the Simon block cipher family
- Observations on the \textsf{SIMON} block cipher family
- Thinking outside the superbox
- Exploring energy efficiency of lightweight block ciphers
- MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Bit-based division property and application to \textsc{Simon} family
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Differential characteristics of base operations in ARX-ciphers
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- A bit-vector differential model for the modular addition by a constant
- On linear hulls and trails
- Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions
- Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
- CLEFIA
- Salsa20
- Trivium
- Barreto-Naehrig
- LBlock
- ChaCha
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- HIGHT
- Ent
- ARXtools
- Camellia
- mCrypton
- NOEKEON
- SipHash
- TWINE
- BLAKE
- EPCBC
- ICEBERG
- Piccolo
- PRINCE
- SIMON
- STR2
- KTANTAN
- Midori
- SKINNY
- Transalg
- Atomic-AES
- LED
- Itubee
- Lilliput
- Skein Hash
- MANTIS
- PICARO
- KATAN
- MISTY
- CHAM
- LEA
- YAARX
- CryptoSMT
- Square
- DLCT
- LowMC
- deep_speck
- Picnic
- SPECK
- TEA
- GIFT
- Kyber
- XTEA
- bitslice-masking-multiplication
- Cryptanalysis of reduced-round SIMON32 and SIMON48
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- Security analysis of subterranean 2.0
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- Automatic search of meet-in-the-middle and impossible differential attacks
- Lower bounds on the degree of block ciphers
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- A MAC mode for lightweight block ciphers
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Pen and Paper Arguments for SIMON and SIMON-like Designs
- SAND
- Gimli
- CRAFT
- Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Chaskey
This page was built for software: SIMECK