Lallemand, Virginie; Naya-Plasencia, María Cryptanalysis of full sprout. (English) Zbl 1375.94142 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 663-682 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Blondeau, Céline; Peyrin, Thomas; Wang, Lei Known-key distinguisher on full \(\mathtt{PRESENT}\). (English) Zbl 1375.94104 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 455-474 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi New attacks on Feistel structures with improved memory complexities. (English) Zbl 1375.94120 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 433-454 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wu, Wenling; Zhang, Lei; Yu, Xiaoli The DBlock family of block ciphers. (English) Zbl 1368.94131 Sci. China, Inf. Sci. 58, No. 3, Article ID 032105, 14 p. (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Guo, Jian; Su, Chunhua; Yap, Wun-She An improved preimage attack against HAVAL-3. (English) Zbl 1320.94065 Inf. Process. Lett. 115, No. 2, 386-393 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Karakoç, F.; Demirci, H.; Harmancı, A. E. AKF: a key alternating Feistel scheme for lightweight cipher designs. (English) Zbl 1320.94070 Inf. Process. Lett. 115, No. 2, 359-367 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Jialin; Lai, Xuejia What is the effective key length for a block cipher: an attack on every practical block cipher. (English) Zbl 1357.94068 Sci. China, Inf. Sci. 57, No. 7, Article ID 072110, 11 p. (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Saarinen, Markku-Juhani Related-key attacks against full Hummingbird-2. (English) Zbl 1321.94088 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 467-482 (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Zhu, Bo; Gong, Guang Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. (English) Zbl 1298.94118 Cryptogr. Commun. 6, No. 4, 313-333 (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Bulygin, Stanislav; Walter, Michael; Buchmann, Johannes Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures. (English) Zbl 1308.94062 Des. Codes Cryptography 73, No. 3, 997-1022 (2014). MSC: 94A60 90C10 × Cite Format Result Cite Review PDF Full Text: DOI
Suzaki, Tomoyasu; Minematsu, Kazuhiko; Morioka, Sumio; Kobayashi, Eita TWINE: a lightweight block cipher for multiple platforms. (English) Zbl 1327.94075 Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 339-354 (2013). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Sasaki, Yu; Wang, Lei Meet-in-the-middle technique for integral attacks against Feistel ciphers. (English) Zbl 1327.94073 Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 234-251 (2013). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Isobe, Takanori; Shibutani, Kyoji All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach. (English) Zbl 1327.94053 Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 202-221 (2013). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Albrecht, Martin R.; Leander, Gregor An all-in-one approach to differential cryptanalysis for small block ciphers. (English) Zbl 1327.94025 Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 1-15 (2013). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI HAL
Aumasson, Jean-Philippe; Henzen, Luca; Meier, Willi; Naya-Plasencia, María Quark: a lightweight hash. (English) Zbl 1279.94053 J. Cryptology 26, No. 2, 313-339 (2013). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Isobe, Takanori A single-key attack on the full GOST block cipher. (English) Zbl 1291.94102 J. Cryptology 26, No. 1, 172-189 (2013). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Minier, Marine; Naya-Plasencia, María A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock. (English) Zbl 1250.94040 Inf. Process. Lett. 112, No. 16, 624-629 (2012). MSC: 94A60 68P25 68W40 × Cite Format Result Cite Review PDF Full Text: DOI
Akishita, Toru; Hiwatari, Harunaga Very compact hardware implementations of the blockcipher CLEFIA. (English) Zbl 1292.94018 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 278-292 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Ågren, Martin Some instant- and practical-time related-key attacks on KTANTAN32/48/64. (English) Zbl 1293.94051 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 213-229 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Knellwolf, Simon; Meier, Willi; Naya-Plasencia, María Conditional differential cryptanalysis of trivium and KATAN. (English) Zbl 1292.94095 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 200-212 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Karakoç, Ferhat; Demirci, Hüseyin; Harmancı, A. Emre Combined differential and linear cryptanalysis of reduced-round PRINTcipher. (English) Zbl 1292.94089 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 169-184 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Krause, Matthias; Hamann, Matthias The cryptographic power of random selection. (English) Zbl 1292.94096 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 134-150 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Bogdanov, Andrey; Shibutani, Kyoji Analysis of \(3\)-line generalized Feistel networks with double SD-functions. (English) Zbl 1260.68019 Inf. Process. Lett. 111, No. 13, 656-660 (2011). MSC: 68M10 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Aumasson, Jean-Philippe; Naya-Plasencia, María; Saarinen, Markku-Juhani O. Practical attack on 8 rounds of the lightweight block cipher KLEIN. (English) Zbl 1291.94053 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 134-145 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Ågren, Martin; Johansson, Thomas Linear cryptanalysis of printcipher – trails and samples everywhere. (English) Zbl 1291.94036 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 114-133 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Abdelraheem, Mohamed Ahmed; Borghoff, Julia; Zenner, Erik; David, Mathieu Cryptanalysis of the light-weight cipher A2U2. (English) Zbl 1291.94037 Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 375-390 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Isobe, Takanori A single-key attack on the full GOST block cipher. (English) Zbl 1307.94059 Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 290-305 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Abdelraheem, Mohamed Ahmed; Leander, Gregor; Zenner, Erik Differential cryptanalysis of round-reduced printcipher: computing roots of permutations. (English) Zbl 1282.94029 Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 1-17 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wu, Wenling; Zhang, Lei LBlock: a lightweight block cipher. (English) Zbl 1250.94047 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 327-344 (2011). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Bogdanov, Andrey On unbalanced feistel networks with contracting MDS diffusion. (English) Zbl 1213.94085 Des. Codes Cryptography 59, No. 1-3, 35-58 (2011). MSC: 94A60 68Q25 × Cite Format Result Cite Review PDF Full Text: DOI
Bogdanov, Andrey; Rechberger, Christian A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN. (English) Zbl 1292.94032 Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 229-240 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
De Cannière, Christophe; Dunkelman, Orr; Knežević, Miroslav KATAN and KTANTAN – a family of small and efficient hardware-oriented block ciphers. (English) Zbl 1290.94060 Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 272-288 (2009). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI