Simon is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013.[2] Simon has been optimized for performance in hardware implementations, while its sister algorithm, Speck, has been optimized for software implementations. Simon is a balanced Feistel cipher (wikipedia).

References in zbMATH (referenced in 17 articles )

Showing results 1 to 17 of 17.
Sorted by year (citations)

  1. Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu: Extended meet-in-the-middle attacks on some Feistel constructions (2016)
  2. Liu, Yu; Fu, Kai; Wang, Wei; Sun, Ling; Wang, Meiqin: Linear cryptanalysis of reduced-round SPECK (2016)
  3. Abdelraheem, Mohamed Ahmed; Alizadeh, Javad; Alkhzaimi, Hoda A.; Aref, Mohammad Reza; Bagheri, Nasour; Gauravaram, Praveen: Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48 (2015)
  4. Bagheri, Nasour: Linear cryptanalysis of reduced-round SIMECK variants (2015)
  5. Biryukov, Alex; Perrin, Léo: On reverse-engineering S-boxes with hidden design criteria or structure (2015)
  6. Blondeau, Céline; Nyberg, Kaisa: Perfect nonlinear functions and cryptography (2015)
  7. Gulcan, Ege; Aysu, Aydin; Schaumont, Patrick: BitCryptor: bit-serialized flexible crypto engine for lightweight applications (2015)
  8. Kölbl, Stefan; Leander, Gregor; Tiessen, Tyge: Observations on the SIMON block cipher family (2015)
  9. Leander, Gregor; Minaud, Brice; Rønjom, Sondre: A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro (2015)
  10. Raddum, Håvard: Algebraic analysis of the Simon block cipher family (2015)
  11. Todo, Yosuke: Structural evaluation by generalized integral property (2015)
  12. Biryukov, Alex; Velichkov, Vesselin: Automatic search for differential trails in ARX ciphers (2014)
  13. Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu: Meet-in-the-middle attacks on generic Feistel constructions (2014)
  14. Lepoint, Tancrède; Naehrig, Michael: A comparison of the homomorphic encryption schemes FV and YASHE (2014)
  15. Sun, Siwei; Hu, Lei; Wang, Peng; Qiao, Kexin; Ma, Xiaoshuang; Song, Ling: Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers (2014)
  16. Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke: Cryptanalysis of reduced-round SIMON32 and SIMON48 (2014)
  17. Wen, Long; Wang, Meiqin; Bogdanov, Andrey; Chen, Huaifeng: Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard (2014)