Midori
From MaRDI portal
Software:29295
No author found.
Related Items (42)
Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications ⋮ Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layers ⋮ Improved Integral Attack on Generalized Feistel Cipher ⋮ On the resilience of Even-Mansour to invariant permutations ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A new non-random property of 4.5-round PRINCE ⋮ PRINCEv2. More security for (almost) no overhead ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ An STP-based model toward designing S-boxes with good cryptographic properties ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ Related-Key Cryptanalysis of Midori ⋮ Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE ⋮ CHAM: a family of lightweight block ciphers for resource-constrained devices ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ New observations on invariant subspace attack ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Rotational differential-linear cryptanalysis revisited ⋮ Nonlinear Invariant Attack ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ A new construction for involutions over finite fields ⋮ GIFT: A Small Present ⋮ Boomerang uniformity of popular S-box constructions ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ On degree-\(d\) zero-sum sets of full rank ⋮ The phantom of differential characteristics ⋮ Bounding the length of impossible differentials for SPN block ciphers ⋮ Involutory differentially 4-uniform permutations from known constructions ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ Cryptographic properties of cyclic binary matrices ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Midori: A Block Cipher for Low Energy ⋮ Nonlinear diffusion layers ⋮ Construction of MDS matrices from generalized Feistel structures ⋮ О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Revised version of block cipher CHAM ⋮ A note on the signal-to-noise ratio of \((n, m)\)-functions ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes ⋮ New Impossible Differential Search Tool from Design and Cryptanalysis Aspects ⋮ Integral characteristics by keyspace partitioning
This page was built for software: Midori