TEA
From MaRDI portal
Software:52224
swMATH36522MaRDI QIDQ52224FDOQ52224
Author name not available (Why is that?)
Cited In (32)
- Title not available (Why is that?)
- Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Title not available (Why is that?)
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Information Security and Cryptology - ICISC 2003
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Related-Key Cryptanalysis of Midori
- A bit-vector differential model for the modular addition by a constant
- Greedy distinguishers and nonrandomness detectors
- The Tiny Encryption Algorithm
- Zero-correlation attacks: statistical models independent of the number of approximations
- Analysis of bitsum attack on block ciphers
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Pseudo-random number generation for Brownian dynamics and dissipative particle dynamics simulations on GPU devices
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Software obfuscation with non-linear mixed Boolean-arithmetic expressions
- Revisiting key schedule's diffusion in relation with round function's diffusion
- A single-key attack on the full GOST block cipher
- Sliding encryption: a cryptographic tool for mobile agents
- Zero correlation linear cryptanalysis with reduced data complexity
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems
- LBlock: a lightweight block cipher
- Meet-in-the-middle attacks on reduced-round XTEA
- Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT
- Proof producing synthesis of arithmetic and cryptographic hardware
- \(\mathsf{xmx}\): a firmware-oriented block cipher based on modular multiplications
This page was built for software: TEA