swMATH23742MaRDI QIDQ35510FDOQ35510
Author name not available (Why is that?)
Official website: http://www.cs.technion.ac.il/~orrd/KATAN/
Cited In (only showing first 100 items - show all)
- Fruit
- Some results on Fruit
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Quark: a lightweight hash
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- WARP: revisiting GFN for lightweight 128-bit block cipher
- What is the effective key length for a block cipher: an attack on every practical block cipher
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- QARMA
- Blockcipher-based authenticated encryption: how small can we go?
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Exploring energy efficiency of lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- Linear cryptanalysis of printcipher -- trails and samples everywhere
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- The Hummingbird-2 lightweight authenticated encryption algorithm
- CAPA
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
- On unbalanced feistel networks with contracting MDS diffusion
- Trivium
- LBlock
- CubeHash
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- HIGHT
- Quark
- spongent
- AEGIS
- mCrypton
- MICKEY
- TWINE
- EPCBC
- eSTREAM
- ICEBERG
- Piccolo
- PRINCE
- DBlock
- FOX
- SIMECK
- SIMON
- KTANTAN
- Midori
- SKINNY
- Generalized MitM attacks on full TWINE
- Espresso
- Atomic-AES
- LED
- Itubee
- Grain
- SHIELD
- ELmD
- MANTIS
- PICARO
- A2U2
- CRYPTON
- MISTY
- CHAM
- PRINTcipher
- Blowfish
- ATHENa
- SPECK
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- CAPA: the spirit of beaver against physical attacks
- TEA
- GIFT
- XTEA
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
- Revised version of block cipher CHAM
- The DBlock family of block ciphers
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Design and analysis of small-state grain-like stream ciphers
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- A single-key attack on the full GOST block cipher
- Espresso: a stream cipher for 5G wireless communication systems
- Cryptanalysis of \textsc{FlexAEAD}
- LBlock: a lightweight block cipher
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Truncated differential based known-key attacks on round-reduced SIMON
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- Orthros
- LLLWBC
- New general framework for algebraic degree evaluation of NFSR-based cryptosystems
- Very Compact Hardware Implementations of the Blockcipher CLEFIA
- Cryptanalysis of the light-weight cipher A2U2
- ExpFault
- The MILP-aided conditional differential attack and its application to Trivium
- Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
- An improved degree evaluation method of NFSR-based cryptosystems
- Biclique attack of block cipher \texttt{SKINNY}
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- The cryptographic power of random selection
This page was built for software: KATAN