Midori
From MaRDI portal
Software:29295
swMATH17436MaRDI QIDQ29295FDOQ29295
Author name not available (Why is that?)
Cited In (42)
- An STP-based model toward designing S-boxes with good cryptographic properties
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Involutory differentially 4-uniform permutations from known constructions
- On the resilience of Even-Mansour to invariant permutations
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- PRINCEv2. More security for (almost) no overhead
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Integral characteristics by keyspace partitioning
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Cryptographic properties of cyclic binary matrices
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Boomerang uniformity of popular S-box constructions
- Related-Key Cryptanalysis of Midori
- Midori: A Block Cipher for Low Energy
- Construction of MDS matrices from generalized Feistel structures
- New observations on invariant subspace attack
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- More accurate division property propagations based on optimized implementations of linear layers
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- Nonlinear Invariant Attack
- Nonlinear diffusion layers
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layers
- GIFT: A Small Present
- Improved Integral Attack on Generalized Feistel Cipher
- Revised version of block cipher CHAM
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Rotational differential-linear cryptanalysis revisited
- A new construction for involutions over finite fields
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования
- Block cipher invariants as eigenvectors of correlation matrices
- Side-Channel Analysis Protection and Low-Latency in Action
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- Bounding the length of impossible differentials for SPN block ciphers
- On degree-\(d\) zero-sum sets of full rank
- The phantom of differential characteristics
This page was built for software: Midori