Cited in
(only showing first 100 items - show all)- Orthros
- LLLWBC
- A MAC mode for lightweight block ciphers
- Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- ExpFault
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- Some results on Fruit
- An improved degree evaluation method of NFSR-based cryptosystems
- The MILP-aided conditional differential attack and its application to Trivium
- A single-key attack on the full GOST block cipher
- CAPA
- Very Compact Hardware Implementations of the Blockcipher CLEFIA
- Cryptanalysis of full sprout
- Cryptanalysis of the light-weight cipher A2U2
- Generalized MitM attacks on full TWINE
- A survey on implementation of lightweight block ciphers for resource constraints devices
- On the uniqueness of a type of cascade connection representations for NFSRs
- Biclique attack of block cipher \texttt{SKINNY}
- New attacks on Feistel structures with improved memory complexities
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- New general framework for algebraic degree evaluation of NFSR-based cryptosystems
- SPEEDY
- The cryptographic power of random selection
- Automatic search of meet-in-the-middle and impossible differential attacks
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2
- Fruit
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- Construction of lightweight S-boxes using Feistel and MISTY structures
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- QARMA
- WARP: revisiting GFN for lightweight 128-bit block cipher
- The DBlock family of block ciphers
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Blockcipher-based authenticated encryption: how small can we go?
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- LBlock: a lightweight block cipher
- Linear cryptanalysis of printcipher -- trails and samples everywhere
- Known-key distinguisher on full \(\mathtt{PRESENT}\)
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Design and analysis of small-state grain-like stream ciphers
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Fish
- HAVAL
- CLEFIA
- Trivium
- LBlock
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- HIGHT
- Quark
- spongent
- AEGIS
- Camellia
- mCrypton
- MICKEY
- Keccak
- TWINE
- EPCBC
- eSTREAM
- PHOTON
- tweakey
- Piccolo
- PRINCE
- DBlock
- FOX
- Whirlpool
- SIMECK
- SIMON
- GNU Crypto
- Midori
- SKINNY
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- SHARK
- Espresso
- Atomic-AES
- LED
- Itubee
- Grain
- SHIELD
- ELmD
- MANTIS
- A2U2
- KATAN
- CRYPTON
- PRINTcipher
- Blowfish
- SPECK
- Analysis of \(3\)-line generalized Feistel networks with double SD-functions
- TEA
- GIFT
This page was built for software: KTANTAN