LED

From MaRDI portal
Software:30814



swMATH18983MaRDI QIDQ30814


No author found.





Related Items (63)

Provable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layersConstruction of higher-level MDS matrices in nested SPNs\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsA survey on implementation of lightweight block ciphers for resource constraints devicesWARP: revisiting GFN for lightweight 128-bit block cipherThe LED Block CipherDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple PlatformsRecursive Diffusion Layers for (Lightweight) Block Ciphers and Hash FunctionsAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreKnown-Key Distinguisher on Full PRESENTCryptanalysis of Full SproutKey recovery attacks on iterated Even-Mansour encryption schemesMore accurate division property propagations based on optimized implementations of linear layersNew observations on invariant subspace attackBeyond quadratic speedups in quantum attacks on symmetric schemesA Very Compact FPGA Implementation of LED and PHOTONGeneralized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTBlockcipher-based authenticated encryption: how small can we go?Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasuresThe DBlock family of block ciphersDesign Strategies for ARX with Provable Bounds: Sparx and LAXA single-key attack on the full GOST block cipherMinimizing the two-round tweakable Even-Mansour cipherBeyond birthday bound secure fresh rekeying: application to authenticated encryptionTight security analysis of 3-round key-alternating cipher with a single permutationImproved security analysis for nonce-based enhanced hash-then-mask MACsCryptanalysis of masked ciphers: a not so random ideaImpossible Differentials of SPN CiphersA related key impossible differential attack against 22 rounds of the lightweight block cipher LBlockMultidimensional meet-in-the-middle attack and its applications to KATAN32/48/64On circulant involutory MDS matricesSome results on FruitAlmost involutory recursive MDS diffusion layersAKF: a key alternating Feistel scheme for lightweight cipher designsEspresso: a stream cipher for 5G wireless communication systemsReflection ciphersOn the direct construction of recursive MDS matricesTowards a general construction of recursive MDS diffusion layersImproving the security and efficiency of block ciphers based on LS-designsMaking the impossible possibleMinimizing the two-round Even-Mansour cipherTruncated differential based known-key attacks on round-reduced SIMONThe resistance of PRESENT-80 against related-key differential attacksSlidex attacks on the Even-Mansour encryption schemeAnalyzing Permutations for AES-like Ciphers: Understanding ShiftRowsImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesNonlinear diffusion layersPerfect nonlinear functions and cryptographyReflection cryptanalysis of PRINCE-like ciphersExploring Energy Efficiency of Lightweight Block CiphersПолное описание одного класса MDS-матриц над конечным полем характеристики 2Wide Trail Design Strategy for Binary MixColumnsON A NEW CIPHER SYSTEM OVER GALOIS FIELDS OF ORDER 27The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsPractical Attack on 8 Rounds of the Lightweight Block Cipher KLEINOn Related-Key Attacks and KASUMI: The Case of A5/3Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS MatricesQuantum generic attacks on key-alternating Feistel ciphers for shorter keysEfficient recursive diffusion layers for block ciphers and hash functionsImproved BV-based quantum attack on block ciphers


This page was built for software: LED