Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
LBlock - MaRDI portal

LBlock

From MaRDI portal
Software:18661



swMATH6569MaRDI QIDQ18661


No author found.





Related Items (50)

A survey on implementation of lightweight block ciphers for resource constraints devicesWARP: revisiting GFN for lightweight 128-bit block cipherImpossible Differential Attacks on Reduced-Round LBlockBiclique Cryptanalysis of Reduced-Round Piccolo Block CipherExtended meet-in-the-middle attacks on some Feistel constructionsDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like CiphersMeet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple PlatformsCryptanalysis of Full SproutAutomatic search for bit-based division propertyStructural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINEAutomatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block CiphersCryptanalysis of KLEINThe Simon and Speck Block Ciphers on AVR 8-Bit MicrocontrollersBiclique cryptanalysis of LBlock and TWINEZero-correlation linear cryptanalysis of reduced-round LBlockFull analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasuresThe DBlock family of block ciphersKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesApplying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block CiphersA unified method for finding impossible differentials of block cipher structuresBiclique Attack of Block Cipher SKINNYA related key impossible differential attack against 22 rounds of the lightweight block cipher LBlockSome results on FruitAKF: a key alternating Feistel scheme for lightweight cipher designsA MAC Mode for Lightweight Block CiphersAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINEAlgebraic Insights into the Secret Feistel NetworkNote on Impossible Differential AttacksJoint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexityMaking the impossible possibleOn the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type CiphersImproved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINEOptimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBCImprovement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-sPractical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksDifferential Forgery Attack Against LACConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresOn the Security of the LAC Authenticated Encryption AlgorithmBagua: a NFSR-based stream cipher constructed following confusion and diffusion principlesCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsProvable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structuresA note on the signal-to-noise ratio of \((n, m)\)-functionsThe summation-truncation hybrid: reusing discarded bits for freeQuantum generic attacks on key-alternating Feistel ciphers for shorter keysKey Difference Invariant Bias in Block CiphersImprobable differential attacks on \texttt{PRESENT} using undisturbed bitsNew Impossible Differential Search Tool from Design and Cryptanalysis Aspects


This page was built for software: LBlock