Pages that link to "Item:Q3457109"
From MaRDI portal
The following pages link to Observations on the SIMON Block Cipher Family (Q3457109):
Displaying 38 items.
- Truncated differential based known-key attacks on round-reduced SIMON (Q522222) (← links)
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys (Q826250) (← links)
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes (Q1726666) (← links)
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis (Q1726672) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Nonlinear diffusion layers (Q1791664) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- Security analysis of subterranean 2.0 (Q2043414) (← links)
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette} (Q2056713) (← links)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714) (← links)
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (Q2068387) (← links)
- Automatic verification of differential characteristics: application to reduced Gimli (Q2102064) (← links)
- A preimage attack on reduced \textsc{Gimli}-\textsc{Gash} (Q2104439) (← links)
- An STP-based model toward designing S-boxes with good cryptographic properties (Q2132443) (← links)
- Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 (Q2152164) (← links)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis (Q2161424) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis (Q2170083) (← links)
- Automatic tool for searching for differential characteristics in ARX ciphers and applications (Q2179383) (← links)
- The phantom of differential characteristics (Q2205883) (← links)
- Computing AES related-key differential characteristics with constraint programming (Q2289026) (← links)
- A bit-vector differential model for the modular addition by a constant (Q2692348) (← links)
- Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques (Q2817827) (← links)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey (Q2822690) (← links)
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants (Q2822692) (← links)
- Pen and Paper Arguments for SIMON and SIMON-like Designs (Q2827732) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Algebraic Analysis of the Simon Block Cipher Family (Q2946447) (← links)
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers (Q2958142) (← links)
- Bit-Based Division Property and Application to Simon Family (Q4639488) (← links)
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers (Q5056021) (← links)
- New method for combining Matsui's bounding conditions with sequential encoding method (Q6063134) (← links)
- Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers (Q6535476) (← links)
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery (Q6536744) (← links)
- Improved attacks on \texttt{GIFT-64} (Q6618592) (← links)
- Improved the automated evaluation algorithm against differential attacks and its application to WARP (Q6619855) (← links)
- Parallel SAT framework to find clustering of differential characteristics and its applications (Q6620061) (← links)
- Automated-based rebound attacks on ACE permutation (Q6636106) (← links)