Cited in
(only showing first 100 items - show all)- Orthros
- LLLWBC
- MiMC
- Remus
- RoadRunneR
- SM4
- Revised version of block cipher CHAM
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- ISAP
- AMulet
- LIGHTER-R
- FreePDK45
- PIPO
- SILVER -- statistical independence and leakage verification
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem
- Monobit Test
- Cryptanalysis of \textsc{FlexAEAD}
- Block cipher invariants as eigenvectors of correlation matrices
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- Bounding the length of impossible differentials for SPN block ciphers
- Saturnin
- ForkAE
- SPEEDY
- Jasmin
- The summation-truncation hybrid: reusing discarded bits for free
- An STP-based model toward designing S-boxes with good cryptographic properties
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Provable one-XOR matrices for construction of \(4 \times 4\) hardware-oriented MDS diffusion layers
- Computing AES related-key differential characteristics with constraint programming
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- Improved (related-key) differential cryptanalysis on GIFT
- Nonce-misuse security of the SAEF authenticated encryption mode
- PRINCEv2. More security for (almost) no overhead
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Security analysis of SIMECK block cipher against related-key impossible differential
- Linearly equivalent s-boxes and the division property
- Lightweight authenticated encryption mode suitable for threshold implementation
- TNT: how to tweak a block cipher
- Tight security of cascaded LRW2
- Blockcipher-based authenticated encryption: how small can we go?
- Impossible differential cryptanalysis of reduced-round tweakable TWINE
- On some properties of the curvature and nondegeneracy of Boolean functions
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Bit-sliding: a generic technique for bit-serial implementations of SPN-based primitives. Applications to AES, PRESENT and SKINNY
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Biclique attack of block cipher \texttt{SKINNY}
- New observations on invariant subspace attack
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- KASUMI
- CLEFIA
- MCBC
- LBlock
- Whirlwind
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- AEGIS
- Camellia
- mCrypton
- NOEKEON
- Keccak
- TWINE
- RevLib
- EPCBC
- PHOTON
- NanGate
- tweakey
- Piccolo
- PRINCE
- FOX
- Whirlpool
- SIMECK
- SIMON
- Twofish
- KTANTAN
- Midori
- COBRA
- Atomic-AES
- LED
- Lilliput
- ELmD
- McOE
- MANTIS
- PICARO
- SAFER
- Serpent
- ELmE
- OleF
- POEx
- KATAN
- CRYPTON
- PRINTcipher
- CryptoSMT
- Square
This page was built for software: SKINNY