spongent
From MaRDI portal
Spongent
Cited in
(42)- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Quantum attacks against BBB secure PRFs or MACs built from public random permutations
- Improved integral attack on generalized Feistel cipher
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- XooTools
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC
- BBB secure nonce based MAC using public permutations
- Multi-user BBB security of public permutations based MAC
- GIFT: a small present. Towards reaching the limit of lightweight encryption
- Subterranean
- Post-quantum security of the sponge construction
- Tornado: automatic generation of probing-secure masked bitsliced implementations
- Optimizing Online Permutation-Based AE Schemes for Lightweight Applications
- ISAP
- Tornado
- SPINS
- CubeHash
- Quark
- Keccak
- EPCBC
- PHOTON
- CBEAM
- Cryptanalysis of KLEIN
- Differential property of \textsc{Present}-like structure
- McOE
- Adaptively code-correlation robustness functions and its applications to private set intersection
- Thinking outside the superbox
- Implementing lightweight block ciphers on \texttt{x86} architectures
- tightPROVE
- Usuba
- SPONGENT: The Design Space of Lightweight Cryptographic Hashing
- Quark: a lightweight hash
- Duplexing the sponge: Single-pass authenticated encryption and other applications
- \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
- Sufficient conditions on padding schemes of sponge construction and sponge-based authenticated-encryption scheme
- Simpira v2: a family of efficient permutations using the AES round function
- Gimli
- Beyond conventional security in sponge-based authenticated encryption modes
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Bitsliced masking and ARM: friends or foes?
This page was built for software: spongent