Cited in
(97)- Orthros
- Improved integral attack on generalized Feistel cipher
- A new construction for involutions over finite fields
- Provable one-XOR matrices for construction of \(4 \times 4\) hardware-oriented MDS diffusion layers
- On degree-\(d\) zero-sum sets of full rank
- The phantom of differential characteristics
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- More accurate division property propagations based on optimized implementations of linear layers
- On the linear and differential cryptanalysis of the AES-like ciphers
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- Rotational differential-linear cryptanalysis revisited
- Block cipher invariants as eigenvectors of correlation matrices
- \texttt{Midori}: a block cipher for low energy
- Remus
- RoadRunneR
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- QARMA
- Romulus
- On the resilience of Even-Mansour to invariant permutations
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- PRINCEv2. More security for (almost) no overhead
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Integral characteristics by keyspace partitioning
- Saturnin
- Revised version of block cipher CHAM
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Construction of MDS matrices from generalized Feistel structures
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- An STP-based model toward designing S-boxes with good cryptographic properties
- New observations on invariant subspace attack
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- ForkAE
- Cryptographic properties of cyclic binary matrices
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- MinT
- CLEFIA
- LBlock
- Whirlwind
- CubeHash
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- spongent
- Camellia
- mCrypton
- NOEKEON
- TWINE
- RevLib
- PHOTON
- NanGate
- Piccolo
- PRINCE
- FOX
- SIMECK
- SIMON
- Twofish
- CBEAM
- KTANTAN
- SKINNY
- Bounding the length of impossible differentials for SPN block ciphers
- SHARK
- Atomic-AES
- LED
- Lilliput
- MANTIS
- PICARO
- Serpent
- KATAN
- CRYPTON
- CHAM
- PRINTcipher
- CryptoSMT
- Square
- SPECK
- Boomerang uniformity of popular S-box constructions
- GIFT
- bitslice-masking-multiplication
- Kuznyechik
- Streebog
- Related-Key Cryptanalysis of Midori
- PIPO
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- SPEEDY
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Nonlinear diffusion layers
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Involutory differentially 4-uniform permutations from known constructions
- Gimli
- CRAFT
This page was built for software: Midori