Midori
From MaRDI portal
Software:29295
swMATH17436MaRDI QIDQ29295FDOQ29295
Author name not available (Why is that?)
Cited In (42)
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Provable one-XOR matrices for construction of \(4 \times 4\) hardware-oriented MDS diffusion layers
- An STP-based model toward designing S-boxes with good cryptographic properties
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Involutory differentially 4-uniform permutations from known constructions
- Improved integral attack on generalized Feistel cipher
- On the resilience of Even-Mansour to invariant permutations
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- PRINCEv2. More security for (almost) no overhead
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Integral characteristics by keyspace partitioning
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- \texttt{Midori}: a block cipher for low energy
- New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Cryptographic properties of cyclic binary matrices
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Boomerang uniformity of popular S-box constructions
- Related-Key Cryptanalysis of Midori
- Construction of MDS matrices from generalized Feistel structures
- New observations on invariant subspace attack
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- More accurate division property propagations based on optimized implementations of linear layers
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- On the linear and differential cryptanalysis of the AES-like ciphers
- Nonlinear diffusion layers
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
- Revised version of block cipher CHAM
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Rotational differential-linear cryptanalysis revisited
- A new construction for involutions over finite fields
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- Block cipher invariants as eigenvectors of correlation matrices
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- Bounding the length of impossible differentials for SPN block ciphers
- On degree-\(d\) zero-sum sets of full rank
- The phantom of differential characteristics
This page was built for software: Midori