Pages that link to "Item:Q2946901"
From MaRDI portal
The following pages link to LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations (Q2946901):
Displaying 34 items.
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- A new non-random property of 4.5-round PRINCE (Q831652) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- New observations on invariant subspace attack (Q1653027) (← links)
- Differential-linear and related key cryptanalysis of round-reduced scream (Q1751405) (← links)
- Nonlinear diffusion layers (Q1791664) (← links)
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 (Q2010591) (← links)
- Tornado: automatic generation of probing-secure masked bitsliced implementations (Q2055659) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light (Q2102070) (← links)
- Differential fault attack on lightweight block cipher PIPO (Q2104448) (← links)
- Differential uniformity and linearity of S-boxes by multiplicative complexity (Q2154885) (← links)
- Improved filter permutators for efficient FHE: better instances and implementations (Q2179380) (← links)
- Boomerang uniformity of popular S-box constructions (Q2200524) (← links)
- On degree-\(d\) zero-sum sets of full rank (Q2202908) (← links)
- Related-Key Attack on Full-Round PICARO (Q2807197) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices (Q2835604) (← links)
- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask (Q2947070) (← links)
- Nonlinear Invariant Attack (Q2953771) (← links)
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity (Q2958119) (← links)
- New classes of $8$-bit permutations based on a butterfly structure (Q3383078) (← links)
- Построение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций (Q3383126) (← links)
- A MAC Mode for Lightweight Block Ciphers (Q4639470) (← links)
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model (Q5738889) (← links)
- How Fast Can Higher-Order Masking Be in Software? (Q5738890) (← links)
- A further study on bridge structures and constructing bijective S-boxes for low-latency masking (Q6063138) (← links)
- A theoretical analysis of generalized invariants of bijective S-boxes (Q6107450) (← links)
- RAMus- a new lightweight block cipher for RAM encryption (Q6134809) (← links)
- Designing S-boxes providing stronger security against differential cryptanalysis for ciphers using byte-wise XOR (Q6618588) (← links)
- Generalized Feistel ciphers for efficient prime field masking (Q6637329) (← links)