Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
KATAN - MaRDI portal

KATAN

From MaRDI portal
Software:35510



swMATH23742MaRDI QIDQ35510


No author found.





Related Items (56)

The Cryptographic Power of Random SelectionCombined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipherConditional Differential Cryptanalysis of Trivium and KATANSome Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64Very Compact Hardware Implementations of the Blockcipher CLEFIAA survey on implementation of lightweight block ciphers for resource constraints devicesWARP: revisiting GFN for lightweight 128-bit block cipherCryptanalysis of FlexAEADThe Hummingbird-2 Lightweight Authenticated Encryption AlgorithmQuark: a lightweight hashAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreCHAM: a family of lightweight block ciphers for resource-constrained devicesCAPA: the spirit of beaver against physical attacksStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionThe Simon and Speck Block Ciphers on AVR 8-Bit MicrocontrollersBlockcipher-based authenticated encryption: how small can we go?Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasuresWhat is the effective key length for a block cipher: an attack on every practical block cipherThe DBlock family of block ciphersGeneralized MitM attacks on full TWINEA Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is NotOn unbalanced feistel networks with contracting MDS diffusionA single-key attack on the full GOST block cipherImproved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KatanBitsliced Masking and ARM: Friends or Foes?Biclique Attack of Block Cipher SKINNYA related key impossible differential attack against 22 rounds of the lightweight block cipher LBlockMultidimensional meet-in-the-middle attack and its applications to KATAN32/48/64Some results on FruitAKF: a key alternating Feistel scheme for lightweight cipher designsThe MILP-aided conditional differential attack and its application to TriviumA MAC Mode for Lightweight Block CiphersStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionEspresso: a stream cipher for 5G wireless communication systemsLBlock: A Lightweight Block CipherDifferential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of PermutationsA Single-Key Attack on the Full GOST Block CipherAn improved degree evaluation method of NFSR-based cryptosystemsDesign and analysis of small-state grain-like stream ciphersTruncated differential based known-key attacks on round-reduced SIMONPractical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksExploring Energy Efficiency of Lightweight Block CiphersConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresA 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANImproved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang FrameworkBagua: a NFSR-based stream cipher constructed following confusion and diffusion principlesKATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block CiphersThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksCryptanalysis of the Light-Weight Cipher A2U2Linear Cryptanalysis of PRINTcipher – Trails and Samples EverywherePractical Attack on 8 Rounds of the Lightweight Block Cipher KLEINRevised version of block cipher CHAMOn the uniqueness of a type of cascade connection representations for NFSRsThe summation-truncation hybrid: reusing discarded bits for freeNew general framework for algebraic degree evaluation of NFSR-based cryptosystems


This page was built for software: KATAN