SKINNY
From MaRDI portal
Software:29294
No author found.
Related Items (49)
Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications ⋮ Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layers ⋮ Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ On some properties of the curvature and nondegeneracy of Boolean functions ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ PRINCEv2. More security for (almost) no overhead ⋮ Nonce-misuse security of the SAEF authenticated encryption mode ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ An STP-based model toward designing S-boxes with good cryptographic properties ⋮ Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE ⋮ Cryptanalysis of FlexAEAD ⋮ Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 ⋮ New observations on invariant subspace attack ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Security analysis of SIMECK block cipher against related-key impossible differential ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem ⋮ Tight security of cascaded LRW2 ⋮ GIFT: A Small Present ⋮ Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives ⋮ Lower bounds on the degree of block ciphers ⋮ Towards closing the security gap of Tweak-aNd-Tweak (TNT) ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ SILVER -- statistical independence and leakage verification ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ Biclique Attack of Block Cipher SKINNY ⋮ Bounding the length of impossible differentials for SPN block ciphers ⋮ \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher ⋮ Linearly equivalent s-boxes and the division property ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ The \texttt{Deoxys} AEAD family ⋮ Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY} ⋮ Impossible Differential Cryptanalysis of Reduced-Round SKINNY ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Revised version of block cipher CHAM ⋮ A note on the signal-to-noise ratio of \((n, m)\)-functions ⋮ The summation-truncation hybrid: reusing discarded bits for free ⋮ Cryptanalysis results on spook. Bringing full-round shadow-512 to the light ⋮ Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) ⋮ New Impossible Differential Search Tool from Design and Cryptanalysis Aspects ⋮ TNT: how to tweak a block cipher ⋮ Lightweight authenticated encryption mode suitable for threshold implementation
This page was built for software: SKINNY