LED
From MaRDI portal
Software:30814
No author found.
Related Items (63)
Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layers ⋮ Construction of higher-level MDS matrices in nested SPNs ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ The LED Block Cipher ⋮ Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers ⋮ $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms ⋮ Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ Known-Key Distinguisher on Full PRESENT ⋮ Cryptanalysis of Full Sprout ⋮ Key recovery attacks on iterated Even-Mansour encryption schemes ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ New observations on invariant subspace attack ⋮ Beyond quadratic speedups in quantum attacks on symmetric schemes ⋮ A Very Compact FPGA Implementation of LED and PHOTON ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures ⋮ The DBlock family of block ciphers ⋮ Design Strategies for ARX with Provable Bounds: Sparx and LAX ⋮ A single-key attack on the full GOST block cipher ⋮ Minimizing the two-round tweakable Even-Mansour cipher ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Tight security analysis of 3-round key-alternating cipher with a single permutation ⋮ Improved security analysis for nonce-based enhanced hash-then-mask MACs ⋮ Cryptanalysis of masked ciphers: a not so random idea ⋮ Impossible Differentials of SPN Ciphers ⋮ A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock ⋮ Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 ⋮ On circulant involutory MDS matrices ⋮ Some results on Fruit ⋮ Almost involutory recursive MDS diffusion layers ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Reflection ciphers ⋮ On the direct construction of recursive MDS matrices ⋮ Towards a general construction of recursive MDS diffusion layers ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Making the impossible possible ⋮ Minimizing the two-round Even-Mansour cipher ⋮ Truncated differential based known-key attacks on round-reduced SIMON ⋮ The resistance of PRESENT-80 against related-key differential attacks ⋮ Slidex attacks on the Even-Mansour encryption scheme ⋮ Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Nonlinear diffusion layers ⋮ Perfect nonlinear functions and cryptography ⋮ Reflection cryptanalysis of PRINCE-like ciphers ⋮ Exploring Energy Efficiency of Lightweight Block Ciphers ⋮ Полное описание одного класса MDS-матриц над конечным полем характеристики 2 ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ ON A NEW CIPHER SYSTEM OVER GALOIS FIELDS OF ORDER 27 ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices ⋮ Quantum generic attacks on key-alternating Feistel ciphers for shorter keys ⋮ Efficient recursive diffusion layers for block ciphers and hash functions ⋮ Improved BV-based quantum attack on block ciphers
This page was built for software: LED