LED
From MaRDI portal
Software:30814
swMATH18983MaRDI QIDQ30814FDOQ30814
Author name not available (Why is that?)
Cited In (63)
- ON A NEW CIPHER SYSTEM OVER GALOIS FIELDS OF ORDER 27
- On Related-Key Attacks and KASUMI: The Case of A5/3
- A Very Compact FPGA Implementation of LED and PHOTON
- Полное описание одного класса MDS-матриц над конечным полем характеристики 2
- Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layers
- Impossible Differentials of SPN Ciphers
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
- On circulant involutory MDS matrices
- Some results on Fruit
- Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Minimizing the two-round Even-Mansour cipher
- Cryptanalysis of Full Sprout
- The LED Block Cipher
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Blockcipher-based authenticated encryption: how small can we go?
- ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
- Making the impossible possible
- Construction of higher-level MDS matrices in nested SPNs
- Towards a general construction of recursive MDS diffusion layers
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- The resistance of PRESENT-80 against related-key differential attacks
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Improved BV-based quantum attack on block ciphers
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Key recovery attacks on iterated Even-Mansour encryption schemes
- Efficient recursive diffusion layers for block ciphers and hash functions
- Beyond quadratic speedups in quantum attacks on symmetric schemes
- Reflection cryptanalysis of PRINCE-like ciphers
- New observations on invariant subspace attack
- Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- More accurate division property propagations based on optimized implementations of linear layers
- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Almost involutory recursive MDS diffusion layers
- Exploring Energy Efficiency of Lightweight Block Ciphers
- Tight security analysis of 3-round key-alternating cipher with a single permutation
- Nonlinear diffusion layers
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Wide Trail Design Strategy for Binary MixColumns
- Known-Key Distinguisher on Full PRESENT
- The DBlock family of block ciphers
- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
- A single-key attack on the full GOST block cipher
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Slidex attacks on the Even-Mansour encryption scheme
- Espresso: a stream cipher for 5G wireless communication systems
- Cryptanalysis of masked ciphers: a not so random idea
- Minimizing the two-round tweakable Even-Mansour cipher
- Improving the security and efficiency of block ciphers based on LS-designs
- On the direct construction of recursive MDS matrices
- Reflection ciphers
- Perfect nonlinear functions and cryptography
- Truncated differential based known-key attacks on round-reduced SIMON
This page was built for software: LED