LED
From MaRDI portal
Software:30814
swMATH18983MaRDI QIDQ30814FDOQ30814
Author name not available (Why is that?)
Cited In (63)
- Provable one-XOR matrices for construction of \(4 \times 4\) hardware-oriented MDS diffusion layers
- On related-key attacks and KASUMI: the case of A5/3
- A very compact FPGA implementation of LED and PHOTON
- Impossible differentials of SPN ciphers
- On a new cipher system over Galois fields of order 27
- Полное описание одного класса MDS-матриц над конечным полем характеристики 2
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- On circulant involutory MDS matrices
- Some results on Fruit
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Minimizing the two-round Even-Mansour cipher
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Blockcipher-based authenticated encryption: how small can we go?
- Making the impossible possible
- Construction of higher-level MDS matrices in nested SPNs
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- Towards a general construction of recursive MDS diffusion layers
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Known-key distinguisher on full \(\mathtt{PRESENT}\)
- The resistance of PRESENT-80 against related-key differential attacks
- Exploring energy efficiency of lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Improved BV-based quantum attack on block ciphers
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Key recovery attacks on iterated Even-Mansour encryption schemes
- Efficient recursive diffusion layers for block ciphers and hash functions
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- Reflection cryptanalysis of PRINCE-like ciphers
- New observations on invariant subspace attack
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- Analyzing permutations for AES-like ciphers: understanding shiftrows
- More accurate division property propagations based on optimized implementations of linear layers
- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Almost involutory recursive MDS diffusion layers
- Tight security analysis of 3-round key-alternating cipher with a single permutation
- Nonlinear diffusion layers
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Wide Trail Design Strategy for Binary MixColumns
- The DBlock family of block ciphers
- A single-key attack on the full GOST block cipher
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Slidex attacks on the Even-Mansour encryption scheme
- Cryptanalysis of full sprout
- Espresso: a stream cipher for 5G wireless communication systems
- The LED block cipher
- Cryptanalysis of masked ciphers: a not so random idea
- Minimizing the two-round tweakable Even-Mansour cipher
- Improving the security and efficiency of block ciphers based on LS-designs
- On the direct construction of recursive MDS matrices
- Reflection ciphers
- Perfect nonlinear functions and cryptography
- Truncated differential based known-key attacks on round-reduced SIMON
This page was built for software: LED