Wu, Wenling; Zhang, Lei; Yu, Xiaoli The DBlock family of block ciphers. (English) Zbl 1368.94131 Sci. China, Inf. Sci. 58, No. 3, Article ID 032105, 14 p. (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis The Simon and Speck block ciphers on AVR 8-bit microcontrollers. (English) Zbl 1382.94059 Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 3-20 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Karakoç, F.; Demirci, H.; Harmancı, A. E. AKF: a key alternating Feistel scheme for lightweight cipher designs. (English) Zbl 1320.94070 Inf. Process. Lett. 115, No. 2, 359-367 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Jialin; Lai, Xuejia What is the effective key length for a block cipher: an attack on every practical block cipher. (English) Zbl 1357.94068 Sci. China, Inf. Sci. 57, No. 7, Article ID 072110, 11 p. (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Zhu, Bo; Gong, Guang Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. (English) Zbl 1298.94118 Cryptogr. Commun. 6, No. 4, 313-333 (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Bulygin, Stanislav; Walter, Michael; Buchmann, Johannes Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures. (English) Zbl 1308.94062 Des. Codes Cryptography 73, No. 3, 997-1022 (2014). MSC: 94A60 90C10 × Cite Format Result Cite Review PDF Full Text: DOI
Bilgin, Begül; Bogdanov, Andrey; Knežević, Miroslav; Mendel, Florian; Wang, Qingju FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware. (English) Zbl 1353.94038 Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 142-158 (2013). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Aumasson, Jean-Philippe; Henzen, Luca; Meier, Willi; Naya-Plasencia, María Quark: a lightweight hash. (English) Zbl 1279.94053 J. Cryptology 26, No. 2, 313-339 (2013). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Isobe, Takanori A single-key attack on the full GOST block cipher. (English) Zbl 1291.94102 J. Cryptology 26, No. 1, 172-189 (2013). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Minier, Marine; Naya-Plasencia, María A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock. (English) Zbl 1250.94040 Inf. Process. Lett. 112, No. 16, 624-629 (2012). MSC: 94A60 68P25 68W40 × Cite Format Result Cite Review PDF Full Text: DOI
Engels, Daniel; Saarinen, Markku-Juhani O.; Schweitzer, Peter; Smith, Eric M. The Hummingbird-2 lightweight authenticated encryption algorithm. (English) Zbl 1436.94057 Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 19-31 (2012). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Akishita, Toru; Hiwatari, Harunaga Very compact hardware implementations of the blockcipher CLEFIA. (English) Zbl 1292.94018 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 278-292 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Ågren, Martin Some instant- and practical-time related-key attacks on KTANTAN32/48/64. (English) Zbl 1293.94051 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 213-229 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Knellwolf, Simon; Meier, Willi; Naya-Plasencia, María Conditional differential cryptanalysis of trivium and KATAN. (English) Zbl 1292.94095 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 200-212 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Karakoç, Ferhat; Demirci, Hüseyin; Harmancı, A. Emre Combined differential and linear cryptanalysis of reduced-round PRINTcipher. (English) Zbl 1292.94089 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 169-184 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Krause, Matthias; Hamann, Matthias The cryptographic power of random selection. (English) Zbl 1292.94096 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 134-150 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Aumasson, Jean-Philippe; Naya-Plasencia, María; Saarinen, Markku-Juhani O. Practical attack on 8 rounds of the lightweight block cipher KLEIN. (English) Zbl 1291.94053 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 134-145 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Ågren, Martin; Johansson, Thomas Linear cryptanalysis of printcipher – trails and samples everywhere. (English) Zbl 1291.94036 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 114-133 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Abdelraheem, Mohamed Ahmed; Borghoff, Julia; Zenner, Erik; David, Mathieu Cryptanalysis of the light-weight cipher A2U2. (English) Zbl 1291.94037 Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 375-390 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Isobe, Takanori A single-key attack on the full GOST block cipher. (English) Zbl 1307.94059 Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 290-305 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Abdelraheem, Mohamed Ahmed; Leander, Gregor; Zenner, Erik Differential cryptanalysis of round-reduced printcipher: computing roots of permutations. (English) Zbl 1282.94029 Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 1-17 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wu, Wenling; Zhang, Lei LBlock: a lightweight block cipher. (English) Zbl 1250.94047 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 327-344 (2011). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Bogdanov, Andrey On unbalanced feistel networks with contracting MDS diffusion. (English) Zbl 1213.94085 Des. Codes Cryptography 59, No. 1-3, 35-58 (2011). MSC: 94A60 68Q25 × Cite Format Result Cite Review PDF Full Text: DOI
Bogdanov, Andrey; Rechberger, Christian A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN. (English) Zbl 1292.94032 Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 229-240 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
De Cannière, Christophe; Dunkelman, Orr; Knežević, Miroslav KATAN and KTANTAN – a family of small and efficient hardware-oriented block ciphers. (English) Zbl 1290.94060 Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 272-288 (2009). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI