swMATH17436MaRDI QIDQ29295FDOQ29295
Author name not available (Why is that?)
Official website: http://link.springer.com/chapter/10.1007%2F978-3-662-48800-3_17
Cited In (95)
- Provable one-XOR matrices for construction of \(4 \times 4\) hardware-oriented MDS diffusion layers
- Orthros
- Improved integral attack on generalized Feistel cipher
- More accurate division property propagations based on optimized implementations of linear layers
- On the linear and differential cryptanalysis of the AES-like ciphers
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- Rotational differential-linear cryptanalysis revisited
- A new construction for involutions over finite fields
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- On degree-\(d\) zero-sum sets of full rank
- The phantom of differential characteristics
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- An STP-based model toward designing S-boxes with good cryptographic properties
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Involutory differentially 4-uniform permutations from known constructions
- Remus
- RoadRunneR
- On the resilience of Even-Mansour to invariant permutations
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- PRINCEv2. More security for (almost) no overhead
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Integral characteristics by keyspace partitioning
- QARMA
- Romulus
- Saturnin
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- \texttt{Midori}: a block cipher for low energy
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Cryptographic properties of cyclic binary matrices
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Boomerang uniformity of popular S-box constructions
- Related-Key Cryptanalysis of Midori
- Construction of MDS matrices from generalized Feistel structures
- New observations on invariant subspace attack
- ForkAE
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- LBlock
- Whirlwind
- CubeHash
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- spongent
- Camellia
- mCrypton
- NOEKEON
- TWINE
- RevLib
- PHOTON
- NanGate
- Piccolo
- PRINCE
- FOX
- SIMECK
- SIMON
- Twofish
- CBEAM
- KTANTAN
- SKINNY
- Nonlinear diffusion layers
- SHARK
- Atomic-AES
- LED
- Lilliput
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- MANTIS
- PICARO
- Serpent
- KATAN
- CRYPTON
- CHAM
- PRINTcipher
- CryptoSMT
- Square
- SPECK
- GIFT
- bitslice-masking-multiplication
- Kuznyechik
- Streebog
- Revised version of block cipher CHAM
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- PIPO
- SPEEDY
- Block cipher invariants as eigenvectors of correlation matrices
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- Bounding the length of impossible differentials for SPN block ciphers
- Gimli
- CRAFT
This page was built for software: Midori