XTEA
From MaRDI portal
Software:52225
swMATH36523MaRDI QIDQ52225FDOQ52225
Author name not available (Why is that?)
Cited In (37)
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Title not available (Why is that?)
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
- Fast Software Encryption
- LBlock: A Lightweight Block Cipher
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- Meet-in-the-Middle Attacks on Reduced-Round XTEA
- Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
- Information Security and Cryptology - ICISC 2003
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Addition with Blinded Operands
- Another Look at Complementation Properties
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- Zero Correlation Linear Cryptanalysis with Reduced Data Complexity
- The Tiny Encryption Algorithm
- Zero-correlation attacks: statistical models independent of the number of approximations
- Analysis of bitsum attack on block ciphers
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
- New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA
- Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- Revisiting key schedule's diffusion in relation with round function's diffusion
- A Weak Key Class of XTEA for a Related-Key Rectangle Attack
- Greedy Distinguishers and Nonrandomness Detectors
- Automatic Search for Differential Trails in ARX Ciphers
- Three-Subset Meet-in-the-Middle Attack on Reduced XTEA
- Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo
- The Multics encipher_Algorithm
- The Additive Differential Probability of ARX
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey
- Chai-Tea, Cryptographic Hardware Implementations of xTEA
- A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems
- The Differential Analysis of S-Functions
This page was built for software: XTEA