\texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
From MaRDI portal
Publication:6652926
DOI10.1007/978-3-031-68385-5_11MaRDI QIDQ6652926
Julian Speith, Christof Paar, Lukas Stennes, Gregor Leander
Publication date: 13 December 2024
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer system organization (68M99)
Cites Work
- Title not available (Why is that?)
- Structural cryptanalysis of SASAS
- The design of Rijndael. The Advanced Encryption Standard (AES)
- An improved affine equivalence algorithm for random permutations
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
- Midori: A Block Cipher for Low Energy
- Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
- Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures
- The LED Block Cipher
- Piccolo: An Ultra-Lightweight Blockcipher
- Trivium
- PRESENT: An Ultra-Lightweight Block Cipher
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Keccak
- GIFT: A Small Present
- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
This page was built for publication: \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6652926)