SKINNY

From MaRDI portal
Software:29294



swMATH17435MaRDI QIDQ29294


No author found.





Related Items (49)

Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applicationsProvable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layersMeet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksOn some properties of the curvature and nondegeneracy of Boolean functions\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsImproved (related-key) differential cryptanalysis on GIFTPRINCEv2. More security for (almost) no overheadNonce-misuse security of the SAEF authenticated encryption modeWARP: revisiting GFN for lightweight 128-bit block cipherAn STP-based model toward designing S-boxes with good cryptographic propertiesImpossible Differential Cryptanalysis of Reduced-Round Tweakable TWINECryptanalysis of FlexAEADPractical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCEMore accurate division property propagations based on optimized implementations of linear layersRelated-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3New observations on invariant subspace attackKey guessing strategies for linear key-schedule algorithms in rectangle attacksA greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysisGeneralized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTSecurity analysis of SIMECK block cipher against related-key impossible differentialBlockcipher-based authenticated encryption: how small can we go?Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemTight security of cascaded LRW2GIFT: A Small PresentBit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based PrimitivesLower bounds on the degree of block ciphersTowards closing the security gap of Tweak-aNd-Tweak (TNT)Beyond birthday bound secure fresh rekeying: application to authenticated encryptionSILVER -- statistical independence and leakage verificationJust tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipherBiclique Attack of Block Cipher SKINNYBounding the length of impossible differentials for SPN block ciphers\textsc{POEx}: a beyond-birthday-bound-secure on-line cipherLinearly equivalent s-boxes and the division propertyBlock cipher invariants as eigenvectors of correlation matricesComputing AES related-key differential characteristics with constraint programmingThe \texttt{Deoxys} AEAD familyBiased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}Impossible Differential Cryptanalysis of Reduced-Round SKINNYThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsRevised version of block cipher CHAMA note on the signal-to-noise ratio of \((n, m)\)-functionsThe summation-truncation hybrid: reusing discarded bits for freeCryptanalysis results on spook. Bringing full-round shadow-512 to the lightAlzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)New Impossible Differential Search Tool from Design and Cryptanalysis AspectsTNT: how to tweak a block cipherLightweight authenticated encryption mode suitable for threshold implementation


This page was built for software: SKINNY