SIMECK

From MaRDI portal
Software:25734



swMATH13823WikidataQ123191660MaRDI QIDQ25734


No author found.





Related Items (65)

Thinking outside the superbox\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsWARP: revisiting GFN for lightweight 128-bit block cipherExtended meet-in-the-middle attacks on some Feistel constructionsDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like CiphersAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreOn Linear Hulls and TrailsOn Reverse-Engineering S-Boxes with Hidden Design Criteria or StructureObservations on the SIMON Block Cipher FamilyCHAM: a family of lightweight block ciphers for resource-constrained devicesDifferential-ML distinguisher: machine learning based generic extension for differential cryptanalysisLinear Cryptanalysis of Reduced-Round SIMECK VariantsImproved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysisA greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysisRevisiting the wrong-key-randomization hypothesisMeet-in-the-Middle Attacks on Generic Feistel ConstructionsCryptanalysis of Reduced-Round SIMON32 and SIMON48Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTSecurity analysis of SIMECK block cipher against related-key impossible differentialAlgebraic Analysis of the Simon Block Cipher FamilyAutomatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECKA Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and ZorroStructural Evaluation by Generalized Integral PropertyMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityDesign Strategies for ARX with Provable Bounds: Sparx and LAXApplying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block CiphersA Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is NotA bit-vector differential model for the modular addition by a constantLower bounds on the degree of block ciphersBeyond birthday bound secure fresh rekeying: application to authenticated encryptionConstructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functionsOn the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functionsMultidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standardA MAC Mode for Lightweight Block CiphersLightweight MDS Generalized Circulant MatricesAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINEAutomatic Search for the Best Trails in ARX: Application to Block Cipher SpeckBit-Based Division Property and Application to Simon FamilyAlgebraic Insights into the Secret Feistel NetworkAutomatic Search for Differential Trails in ARX CiphersUpper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexityTruncated differential based known-key attacks on round-reduced SIMONPerfect nonlinear functions and cryptographyThe Oribatida v1.3 family of lightweight authenticated encryption schemesSecurity analysis of subterranean 2.0Exploring Energy Efficiency of Lightweight Block CiphersВероятностные характеристики разностных и линейных соотношений для неоднородной линейной средыРазностные характеристики основных операций ARX-шифровAutomatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEALinear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing TechniquesImpossible Differential Attack on Reduced Round SPARX-64/128On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon VariantsCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticePen and Paper Arguments for SIMON and SIMON-like DesignsA Comparison of the Homomorphic Encryption Schemes FV and YASHEAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsRevised version of block cipher CHAMThe summation-truncation hybrid: reusing discarded bits for freeA white-box speck implementation using self-equivalence encodingsImproved differential-linear attack with application to round-reduced Speck32/64The MALICIOUS framework: embedding backdoors into tweakable block ciphersAlzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)New Impossible Differential Search Tool from Design and Cryptanalysis Aspects


This page was built for software: SIMECK