TEA
From MaRDI portal
Software:52224
swMATH36522MaRDI QIDQ52224FDOQ52224
Author name not available (Why is that?)
Cited In (32)
- Title not available (Why is that?)
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Title not available (Why is that?)
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
- LBlock: A Lightweight Block Cipher
- Meet-in-the-Middle Attacks on Reduced-Round XTEA
- Information Security and Cryptology - ICISC 2003
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Sliding encryption: A cryptographic tool for mobile agents
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- Related-Key Cryptanalysis of Midori
- Zero Correlation Linear Cryptanalysis with Reduced Data Complexity
- A bit-vector differential model for the modular addition by a constant
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- The Tiny Encryption Algorithm
- Zero-correlation attacks: statistical models independent of the number of approximations
- Analysis of bitsum attack on block ciphers
- XMX: A firmware-oriented block cipher based on modular multiplications
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Pseudo-random number generation for Brownian dynamics and dissipative particle dynamics simulations on GPU devices
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA
- Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Software obfuscation with non-linear mixed Boolean-arithmetic expressions
- Revisiting key schedule's diffusion in relation with round function's diffusion
- A single-key attack on the full GOST block cipher
- Greedy Distinguishers and Nonrandomness Detectors
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems
- Proof producing synthesis of arithmetic and cryptographic hardware
This page was built for software: TEA