SPECK
From MaRDI portal
Software:45588
No author found.
Related Items (52)
Thinking outside the superbox ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ On Linear Hulls and Trails ⋮ Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis ⋮ Revisiting the wrong-key-randomization hypothesis ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Security analysis of SIMECK block cipher against related-key impossible differential ⋮ Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK ⋮ The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Grover on \(SIMON\) ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers ⋮ Design Strategies for ARX with Provable Bounds: Sparx and LAX ⋮ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ Linear cryptanalysis of reduced-round SPECK ⋮ GIFT: A Small Present ⋮ Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives ⋮ A bit-vector differential model for the modular addition by a constant ⋮ Lower bounds on the degree of block ciphers ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions ⋮ On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions ⋮ Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard ⋮ Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff ⋮ Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK ⋮ Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity ⋮ Perfect nonlinear functions and cryptography ⋮ The Oribatida v1.3 family of lightweight authenticated encryption schemes ⋮ Security analysis of subterranean 2.0 ⋮ Exploring Energy Efficiency of Lightweight Block Ciphers ⋮ Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋮ Improving attacks on round-reduced Speck32/64 using deep learning ⋮ Impossible Differential Attack on Reduced Round SPARX-64/128 ⋮ Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey ⋮ On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ Pen and Paper Arguments for SIMON and SIMON-like Designs ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Revised version of block cipher CHAM ⋮ A white-box speck implementation using self-equivalence encodings ⋮ Improved differential-linear attack with application to round-reduced Speck32/64
This page was built for software: SPECK