SIMON
From MaRDI portal
Software:25735
No author found.
Related Items (only showing first 100 items - show all)
Thinking outside the superbox ⋮ (Quantum) cryptanalysis of misty schemes ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ An STP-based model toward designing S-boxes with good cryptographic properties ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ Unnamed Item ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ On Linear Hulls and Trails ⋮ Related-Key Cryptanalysis of Midori ⋮ On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure ⋮ Observations on the SIMON Block Cipher Family ⋮ CHAM: a family of lightweight block ciphers for resource-constrained devices ⋮ Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis ⋮ Linear Cryptanalysis of Reduced-Round SIMECK Variants ⋮ Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48 ⋮ Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 ⋮ Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis ⋮ Revisiting the wrong-key-randomization hypothesis ⋮ Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers ⋮ Meet-in-the-Middle Attacks on Generic Feistel Constructions ⋮ Fault Analysis on SIMON Family of Lightweight Block Ciphers ⋮ Cryptanalysis of Reduced-Round SIMON32 and SIMON48 ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Security analysis of SIMECK block cipher against related-key impossible differential ⋮ Algebraic Analysis of the Simon Block Cipher Family ⋮ Differential Analysis of Block Ciphers SIMON and SPECK ⋮ The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers ⋮ A Flexible and Compact Hardware Architecture for the SIMON Block Cipher ⋮ Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers ⋮ A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro ⋮ Structural Evaluation by Generalized Integral Property ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Grover on \(SIMON\) ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ Design Strategies for ARX with Provable Bounds: Sparx and LAX ⋮ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ Linear cryptanalysis of reduced-round SPECK ⋮ A bit-vector differential model for the modular addition by a constant ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ Lower bounds on the degree of block ciphers ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Quantum collision attacks on AES-like hashing with low quantum random access memories ⋮ Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions ⋮ The phantom of differential characteristics ⋮ Unnamed Item ⋮ Biclique Attack of Block Cipher SKINNY ⋮ On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions ⋮ Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard ⋮ Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round ⋮ Integral attacks on round-reduced Bel-T-256 ⋮ The MILP-aided conditional differential attack and its application to Trivium ⋮ Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff ⋮ Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK ⋮ Bricklayer attack: a side-channel analysis on the ChaCha quarter round ⋮ Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity ⋮ Truncated differential based known-key attacks on round-reduced SIMON ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Rotational-XOR cryptanalysis of Simon-like block ciphers ⋮ Nonlinear diffusion layers ⋮ Perfect nonlinear functions and cryptography ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ The Oribatida v1.3 family of lightweight authenticated encryption schemes ⋮ Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s ⋮ Security analysis of subterranean 2.0 ⋮ Exploring Energy Efficiency of Lightweight Block Ciphers ⋮ Differential Forgery Attack Against LAC ⋮ The \texttt{Deoxys} AEAD family ⋮ Вероятностные характеристики разностных и линейных соотношений для неоднородной линейной среды ⋮ Разностные характеристики основных операций ARX-шифров ⋮ Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework ⋮ Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋮ Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques ⋮ Improving attacks on round-reduced Speck32/64 using deep learning ⋮ Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey ⋮ On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ Pen and Paper Arguments for SIMON and SIMON-like Designs ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Revised version of block cipher CHAM ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis ⋮ The summation-truncation hybrid: reusing discarded bits for free ⋮ A white-box speck implementation using self-equivalence encodings ⋮ Improved differential-linear attack with application to round-reduced Speck32/64 ⋮ Automatic verification of differential characteristics: application to reduced Gimli ⋮ The MALICIOUS framework: embedding backdoors into tweakable block ciphers ⋮ Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) ⋮ A preimage attack on reduced \textsc{Gimli}-\textsc{Gash} ⋮ Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack
This page was built for software: SIMON