CLEFIA
From MaRDI portal
Software:15580
No author found.
Related Items (68)
Very Compact Hardware Implementations of the Blockcipher CLEFIA ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers ⋮ $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms ⋮ Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure ⋮ Cryptanalysis of Full Sprout ⋮ CHAM: a family of lightweight block ciphers for resource-constrained devices ⋮ Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE ⋮ BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications ⋮ A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems ⋮ Differential property of \textsc{Present}-like structure ⋮ The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers ⋮ Biclique cryptanalysis of LBlock and TWINE ⋮ Towards the optimality of Feistel ciphers with substitution-permutation functions ⋮ Generalized Feistel networks revisited ⋮ Differential analysis of the extended generalized Feistel networks ⋮ The DBlock family of block ciphers ⋮ Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited ⋮ On the multiplicative complexity of Boolean functions and bitsliced higher-order masking ⋮ Applications of Simon's algorithm in quantum attacks on Feistel variants ⋮ Analysis of \(3\)-line generalized Feistel networks with double SD-functions ⋮ On unbalanced feistel networks with contracting MDS diffusion ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data ⋮ The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers ⋮ The 128-Bit Blockcipher CLEFIA (Extended Abstract) ⋮ Impossible Differential Cryptanalysis of CLEFIA ⋮ Linear hulls with correlation zero and linear cryptanalysis of block ciphers ⋮ Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher ⋮ Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard ⋮ Cryptographic properties and application of a generalized unbalanced Feistel network structure ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE ⋮ Parallelizing the Camellia and SMS4 Block Ciphers ⋮ LBlock: A Lightweight Block Cipher ⋮ On Maximum Differential Probability of Generalized Feistel ⋮ Making the impossible possible ⋮ PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications ⋮ Improving the Generalized Feistel ⋮ The resistance of PRESENT-80 against related-key differential attacks ⋮ Proposition of Two Cipher Structures ⋮ The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA ⋮ Greedy Distinguishers and Nonrandomness Detectors ⋮ Troika: a ternary cryptographic hash function ⋮ Polynomial Evaluation and Side Channel Analysis ⋮ A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box ⋮ Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns ⋮ Improved Meet-in-the-Middle Distinguisher on Feistel Schemes ⋮ Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure ⋮ Impossible Differential Analysis of Reduced Round CLEFIA ⋮ Multiset structural attack on generalized Feistel networks ⋮ On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Saturation Attack on the Block Cipher HIGHT ⋮ An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines ⋮ Cache Timing Attacks on Clefia ⋮ Efficient systolic multiplications in composite fields for cryptographic systems ⋮ Revised version of block cipher CHAM ⋮ On the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\) ⋮ Tweakable Pseudorandom Permutation from Generalized Feistel Structure ⋮ Improbable differential attacks on \texttt{PRESENT} using undisturbed bits ⋮ New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
This page was built for software: CLEFIA