Pages that link to "Item:Q2946969"
From MaRDI portal
The following pages link to The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers (Q2946969):
Displaying 50 items.
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (Q510448) (← links)
- Truncated differential based known-key attacks on round-reduced SIMON (Q522222) (← links)
- The key-dependent message security of key-alternating Feistel ciphers (Q826271) (← links)
- On the cost of ASIC hardware crackers: a SHA-1 case study (Q826307) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- Linear cryptanalysis of reduced-round SPECK (Q903200) (← links)
- The Missing Difference problem, and its applications to counter mode encryption (Q1648860) (← links)
- Hold your breath, PRIMATEs are lightweight (Q1698631) (← links)
- Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions (Q1704202) (← links)
- Integral attacks on round-reduced Bel-T-256 (Q1726664) (← links)
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes (Q1726666) (← links)
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis (Q1726672) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-128 (Q1746987) (← links)
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK (Q1981795) (← links)
- Security analysis of subterranean 2.0 (Q2043414) (← links)
- Improving key-recovery in linear attacks: application to 28-round PRESENT (Q2055609) (← links)
- A deeper look at machine learning-based cryptanalysis (Q2056717) (← links)
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (Q2068387) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- A white-box speck implementation using self-equivalence encodings (Q2096645) (← links)
- Improved differential-linear attack with application to round-reduced Speck32/64 (Q2096647) (← links)
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers (Q2102066) (← links)
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) (Q2102073) (← links)
- Thinking outside the superbox (Q2129002) (← links)
- Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis (Q2146092) (← links)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis (Q2161424) (← links)
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis (Q2170083) (← links)
- Revisiting the wrong-key-randomization hypothesis (Q2175215) (← links)
- Automatic tool for searching for differential characteristics in ARX ciphers and applications (Q2179383) (← links)
- Exploring lightweight efficiency of ForkAES (Q2179412) (← links)
- Blockcipher-based authenticated encryption: how small can we go? (Q2188958) (← links)
- Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff (Q2232120) (← links)
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- Grover on \(SIMON\) (Q2681716) (← links)
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher (Q2794511) (← links)
- Exploring Energy Efficiency of Lightweight Block Ciphers (Q2807203) (← links)
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA (Q2817825) (← links)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey (Q2822690) (← links)
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants (Q2822692) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- Pen and Paper Arguments for SIMON and SIMON-like Designs (Q2827732) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks (Q2829214) (← links)
- Improved Top-Down Techniques in Differential Cryptanalysis (Q2946446) (← links)
- Algebraic Analysis of the Simon Block Cipher Family (Q2946447) (← links)
- Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications (Q2946469) (← links)
- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher (Q2946972) (← links)
- AES Smaller Than S-Box (Q2946974) (← links)