SIMON
From MaRDI portal
Software:25735
swMATH13824MaRDI QIDQ25735FDOQ25735
Author name not available (Why is that?)
Cited In (only showing first 100 items - show all)
- An STP-based model toward designing S-boxes with good cryptographic properties
- Computing AES related-key differential characteristics with constraint programming
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Improving attacks on round-reduced Speck32/64 using deep learning
- (Quantum) cryptanalysis of misty schemes
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Security analysis of SIMECK block cipher against related-key impossible differential
- A MAC Mode for Lightweight Block Ciphers
- Blockcipher-based authenticated encryption: how small can we go?
- Bricklayer attack: a side-channel analysis on the ChaCha quarter round
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
- Algebraic Differential Fault Analysis on SIMON Block Cipher
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Related-Key Cryptanalysis of Midori
- Efficient Design Strategies Based on the AES Round Function
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Structural Evaluation by Generalized Integral Property
- Cryptanalysis of FlexAEAD
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes
- Exploring Energy Efficiency of Lightweight Block Ciphers
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- Security analysis of subterranean 2.0
- The \texttt{Deoxys} AEAD family
- Algebraic Analysis of the Simon Block Cipher Family
- Fault Analysis on SIMON Family of Lightweight Block Ciphers
- Differential Analysis of Block Ciphers SIMON and SPECK
- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Nonlinear diffusion layers
- Lower bounds on the degree of block ciphers
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- More accurate results on the provable security of AES against impossible differential cryptanalysis
- Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48
- Observations on the SIMON Block Cipher Family
- Linear cryptanalysis of reduced-round SPECK
- GIFT: A Small Present
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- Automatic verification of differential characteristics: application to reduced Gimli
- Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s
- Revised version of block cipher CHAM
- A comparison of the homomorphic encryption schemes FV and YASHE
- Cryptanalysis of Reduced-Round SIMON32 and SIMON48
- Automatic Search for Differential Trails in ARX Ciphers
- Lightweight MDS Generalized Circulant Matrices
- Extended meet-in-the-middle attacks on some Feistel constructions
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Bit-Based Division Property and Application to Simon Family
- Improved differential-linear attack with application to round-reduced Speck32/64
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- Meet-in-the-middle attacks on generic Feistel constructions
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Impossible Differential Attack on Reduced Round SPARX-64/128
- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
- Perfect nonlinear functions and cryptography
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Integral attacks on round-reduced Bel-T-256
- Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
- Rotational-XOR cryptanalysis of Simon-like block ciphers
- A preimage attack on reduced \textsc{Gimli}-\textsc{Gash}
- On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions
- Truncated differential based known-key attacks on round-reduced SIMON
- Title not available (Why is that?)
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- Linear Cryptanalysis of Reduced-Round SIMECK Variants
- Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack
- Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK
- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- The MILP-aided conditional differential attack and its application to Trivium
- Grover on \(SIMON\)
- Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff
- Thinking outside the superbox
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- A bit-vector differential model for the modular addition by a constant
- Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
- Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis
- Algebraic Insights into the Secret Feistel Network
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT
- More accurate division property propagations based on optimized implementations of linear layers
- Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3
This page was built for software: SIMON