SIMON

Simon is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013.[2] Simon has been optimized for performance in hardware implementations, while its sister algorithm, Speck, has been optimized for software implementations. Simon is a balanced Feistel cipher (wikipedia).


References in zbMATH (referenced in 18 articles )

Showing results 1 to 18 of 18.
Sorted by year (citations)

  1. Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng: The $ SKINNY$ family of block ciphers and its low-latency variant $ MANTIS$ (2016)
  2. Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu: Extended meet-in-the-middle attacks on some Feistel constructions (2016)
  3. Liu, Yu; Fu, Kai; Wang, Wei; Sun, Ling; Wang, Meiqin: Linear cryptanalysis of reduced-round SPECK (2016)
  4. Abdelraheem, Mohamed Ahmed; Alizadeh, Javad; Alkhzaimi, Hoda A.; Aref, Mohammad Reza; Bagheri, Nasour; Gauravaram, Praveen: Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48 (2015)
  5. Bagheri, Nasour: Linear cryptanalysis of reduced-round SIMECK variants (2015)
  6. Biryukov, Alex; Perrin, Léo: On reverse-engineering S-boxes with hidden design criteria or structure (2015)
  7. Blondeau, Céline; Nyberg, Kaisa: Perfect nonlinear functions and cryptography (2015)
  8. Gulcan, Ege; Aysu, Aydin; Schaumont, Patrick: BitCryptor: bit-serialized flexible crypto engine for lightweight applications (2015)
  9. Kölbl, Stefan; Leander, Gregor; Tiessen, Tyge: Observations on the SIMON block cipher family (2015)
  10. Leander, Gregor; Minaud, Brice; Rønjom, Sondre: A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro (2015)
  11. Raddum, Håvard: Algebraic analysis of the Simon block cipher family (2015)
  12. Todo, Yosuke: Structural evaluation by generalized integral property (2015)
  13. Biryukov, Alex; Velichkov, Vesselin: Automatic search for differential trails in ARX ciphers (2014)
  14. Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu: Meet-in-the-middle attacks on generic Feistel constructions (2014)
  15. Lepoint, Tancrède; Naehrig, Michael: A comparison of the homomorphic encryption schemes FV and YASHE (2014)
  16. Sun, Siwei; Hu, Lei; Wang, Peng; Qiao, Kexin; Ma, Xiaoshuang; Song, Ling: Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers (2014)
  17. Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke: Cryptanalysis of reduced-round SIMON32 and SIMON48 (2014)
  18. Wen, Long; Wang, Meiqin; Bogdanov, Andrey; Chen, Huaifeng: Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard (2014)