XTEA
From MaRDI portal
Software:52225
swMATH36523MaRDI QIDQ52225FDOQ52225
Author name not available (Why is that?)
Cited In (37)
- Another look at complementation properties
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Title not available (Why is that?)
- Fast Software Encryption
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
- Information Security and Cryptology - ICISC 2003
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Addition with Blinded Operands
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- Zero Correlation Linear Cryptanalysis with Reduced Data Complexity
- Greedy distinguishers and nonrandomness detectors
- The Tiny Encryption Algorithm
- Zero-correlation attacks: statistical models independent of the number of approximations
- Analysis of bitsum attack on block ciphers
- Three-subset meet-in-the-middle attack on reduced XTEA
- Security analysis of the lightweight block ciphers XTEA, LED and Piccolo
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA
- Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- The differential analysis of S-functions
- Revisiting key schedule's diffusion in relation with round function's diffusion
- A Weak Key Class of XTEA for a Related-Key Rectangle Attack
- Automatic Search for Differential Trails in ARX Ciphers
- The Multics encipher_Algorithm
- The Additive Differential Probability of ARX
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems
- LBlock: a lightweight block cipher
- Meet-in-the-middle attacks on reduced-round XTEA
- Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT
- Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags
This page was built for software: XTEA