Pages that link to "Item:Q3172974"
From MaRDI portal
The following pages link to Piccolo: An Ultra-Lightweight Blockcipher (Q3172974):
Displaying 50 items.
- Piccolo (Q25157) (← links)
- Towards the optimality of Feistel ciphers with substitution-permutation functions (Q398983) (← links)
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers (Q436555) (← links)
- Espresso: a stream cipher for 5G wireless communication systems (Q505077) (← links)
- Truncated differential based known-key attacks on round-reduced SIMON (Q522222) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- The DBlock family of block ciphers (Q893839) (← links)
- On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes (Q1698626) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- The resistance of PRESENT-80 against related-key differential attacks (Q2016426) (← links)
- Provable related-key security of contracting Feistel networks (Q2057179) (← links)
- On the (im)possibility of improving the round diffusion of generalized Feistel structures (Q2059884) (← links)
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (Q2068387) (← links)
- A note on the signal-to-noise ratio of \((n, m)\)-functions (Q2085718) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Transparency order of \((n, m)\)-functions -- its further characterization and applications (Q2154041) (← links)
- Blockcipher-based authenticated encryption: how small can we go? (Q2188958) (← links)
- Troika: a ternary cryptographic hash function (Q2285779) (← links)
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher (Q2794511) (← links)
- Exploring Energy Efficiency of Lightweight Block Ciphers (Q2807203) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks (Q2829214) (← links)
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo (Q2874334) (← links)
- Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications (Q2946469) (← links)
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 (Q2946869) (← links)
- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask (Q2947070) (← links)
- Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN (Q3104730) (← links)
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core (Q3179484) (← links)
- LHash: A Lightweight Hash Function (Q3454161) (← links)
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications (Q3460184) (← links)
- A MAC Mode for Lightweight Block Ciphers (Q4639470) (← links)
- Optimizing S-Box Implementations for Several Criteria Using SAT Solvers (Q4639475) (← links)
- Robust Encryption, Revisited (Q4916019) (← links)
- Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers (Q5056021) (← links)
- (Q5150669) (← links)
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes (Q5267803) (← links)
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects (Q5270362) (← links)
- Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher (Q6121424) (← links)
- Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes (Q6157581) (← links)
- Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience (Q6487211) (← links)
- Observations on the branch number and differential analysis of SPEEDY (Q6499098) (← links)
- A forkcipher-based pseudo-random number generator (Q6535108) (← links)
- Flatness and structural analysis for the design of stream ciphers involving hybrid automata (Q6551625) (← links)
- Probabilistic related-key statistical saturation cryptanalysis (Q6620045) (← links)
- From substitution box to threshold (Q6623294) (← links)