The following pages link to TEA (Q52224):
Displaying 32 items.
- AKF: a key alternating Feistel scheme for lightweight cipher designs (Q477688) (← links)
- Pseudo-random number generation for Brownian dynamics and dissipative particle dynamics simulations on GPU devices (Q655040) (← links)
- Zero-correlation attacks: statistical models independent of the number of approximations (Q1650805) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis (Q2161424) (← links)
- A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems (Q2198480) (← links)
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory (Q2228439) (← links)
- New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA (Q2493294) (← links)
- Revisiting key schedule's diffusion in relation with round function's diffusion (Q2510656) (← links)
- Proof producing synthesis of arithmetic and cryptographic hardware (Q2642982) (← links)
- Software obfuscation with non-linear mixed Boolean-arithmetic expressions (Q2672451) (← links)
- A bit-vector differential model for the modular addition by a constant (Q2692348) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA (Q2817825) (← links)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey (Q2822690) (← links)
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT (Q2900613) (← links)
- LBlock: A Lightweight Block Cipher (Q3011308) (← links)
- (Q3046338) (← links)
- Greedy Distinguishers and Nonrandomness Detectors (Q3058726) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round XTEA (Q3073711) (← links)
- Related-Key Cryptanalysis of Midori (Q3179490) (← links)
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications (Q3452237) (← links)
- Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol (Q3627766) (← links)
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT (Q3634486) (← links)
- XMX: A firmware-oriented block cipher based on modular multiplications (Q4639338) (← links)
- Sliding encryption: A cryptographic tool for mobile agents (Q4639344) (← links)
- Zero Correlation Linear Cryptanalysis with Reduced Data Complexity (Q4899695) (← links)
- Analysis of bitsum attack on block ciphers (Q5069833) (← links)
- (Q5150613) (← links)
- The Tiny Encryption Algorithm (Q5457837) (← links)
- Chai-Tea, Cryptographic Hardware Implementations of xTEA (Q5504636) (← links)
- Information Security and Cryptology - ICISC 2003 (Q5714145) (← links)