Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
CLEFIA - MaRDI portal

CLEFIA

From MaRDI portal
Software:15580



swMATH3047MaRDI QIDQ15580


No author found.





Related Items (68)

Very Compact Hardware Implementations of the Blockcipher CLEFIA\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsWARP: revisiting GFN for lightweight 128-bit block cipherMeet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple PlatformsRecursive Diffusion Layers for (Lightweight) Block Ciphers and Hash FunctionsAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreOn Reverse-Engineering S-Boxes with Hidden Design Criteria or StructureCryptanalysis of Full SproutCHAM: a family of lightweight block ciphers for resource-constrained devicesStructural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINEBitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight ApplicationsA colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systemsDifferential property of \textsc{Present}-like structureThe Simon and Speck Block Ciphers on AVR 8-Bit MicrocontrollersBiclique cryptanalysis of LBlock and TWINETowards the optimality of Feistel ciphers with substitution-permutation functionsGeneralized Feistel networks revisitedDifferential analysis of the extended generalized Feistel networksThe DBlock family of block ciphersImproved improbable differential attacks on ISO standard CLEFIA: expansion technique revisitedOn the multiplicative complexity of Boolean functions and bitsliced higher-order maskingApplications of Simon's algorithm in quantum attacks on Feistel variantsAnalysis of \(3\)-line generalized Feistel networks with double SD-functionsOn unbalanced feistel networks with contracting MDS diffusionBeyond birthday bound secure fresh rekeying: application to authenticated encryptionProbably Secure Keyed-Function Based Authenticated Encryption Schemes for Big DataThe provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphersThe 128-Bit Blockcipher CLEFIA (Extended Abstract)Impossible Differential Cryptanalysis of CLEFIALinear hulls with correlation zero and linear cryptanalysis of block ciphersImproved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block CipherMultidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standardCryptographic properties and application of a generalized unbalanced Feistel network structureA MAC Mode for Lightweight Block CiphersAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINEParallelizing the Camellia and SMS4 Block CiphersLBlock: A Lightweight Block CipherOn Maximum Differential Probability of Generalized FeistelMaking the impossible possiblePRINCE – A Low-Latency Block Cipher for Pervasive Computing ApplicationsImproving the Generalized FeistelThe resistance of PRESENT-80 against related-key differential attacksProposition of Two Cipher StructuresThe Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIAGreedy Distinguishers and Nonrandomness DetectorsTroika: a ternary cryptographic hash functionPolynomial Evaluation and Side Channel AnalysisA Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-BoxCryptanalysis of CLEFIA Using Differential Methods with Cache Trace PatternsImproved Meet-in-the-Middle Distinguisher on Feistel SchemesConstructing Lightweight Optimal Diffusion Primitives with Feistel StructureImpossible Differential Analysis of Reduced Round CLEFIAMultiset structural attack on generalized Feistel networksOn the Diffusion of Generalized Feistel Structures Regarding Differential and Linear CryptanalysisCryptographic Properties and Application of a Generalized Unbalanced Feistel Network StructureReverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1Automatic Search of Meet-in-the-Middle and Impossible Differential AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsSaturation Attack on the Block Cipher HIGHTAn Enhanced Differential Cache Attack on CLEFIA for Large Cache LinesCache Timing Attacks on ClefiaEfficient systolic multiplications in composite fields for cryptographic systemsRevised version of block cipher CHAMOn the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\)Tweakable Pseudorandom Permutation from Generalized Feistel StructureImprobable differential attacks on \texttt{PRESENT} using undisturbed bitsNew Impossible Differential Search Tool from Design and Cryptanalysis Aspects


This page was built for software: CLEFIA