SIMON

Simon is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013.[2] Simon has been optimized for performance in hardware implementations, while its sister algorithm, Speck, has been optimized for software implementations. Simon is a balanced Feistel cipher (wikipedia).


References in zbMATH (referenced in 50 articles )

Showing results 1 to 20 of 50.
Sorted by year (citations)

1 2 3 next

  1. Abdelkhalek, Ahmed; Tolba, Mohamed; Youssef, Amr M.: Impossible differential attack on reduced round SPARX-64/128 (2017)
  2. Feng, Jingyi; Chen, Hua; Gao, Si; Fan, Limin; Feng, Dengguo: Improved fault analysis on the block cipher SPECK by injecting faults in the same round (2017)
  3. Hao, Yonglin; Meier, Willi: Truncated differential based known-key attacks on round-reduced SIMON (2017)
  4. Sasaki, Yu; Todo, Yosuke: New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers (2017)
  5. Zajac, Pavol: Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (2017)
  6. Zheng, Yafei; Wu, Wenling: Biclique attack of block cipher SKINNY (2017)
  7. Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian; Roy, Arnab; Tiessen, Tyge: MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity (2016)
  8. Ashur, Tomer; Rijmen, Vincent: On linear hulls and trails (2016)
  9. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
  10. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Exploring energy efficiency of lightweight block ciphers (2016)
  11. Beierle, Christof: Pen and paper arguments for SIMON and SIMON-like designs (2016)
  12. Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng: The $ SKINNY$ family of block ciphers and its low-latency variant $ MANTIS$ (2016)
  13. Biryukov, Alex; Dinu, Daniel; Großschädl, Johann: Correlation power analysis of lightweight block ciphers: from theory to practice (2016)
  14. Chen, Cong; Farmani, Mohammad; Eisenbarth, Thomas: A tale of two shares: why two-share threshold implementation seems worthwhile -- and why it Is not (2016)
  15. Chen, Jiageng; Teh, Je Sen; Su, Chunhua; Samsudin, Azman; Fang, Junbin: Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework (2016)
  16. Derbez, Patrick; Fouque, Pierre-Alain: Automatic search of meet-in-the-middle and impossible differential attacks (2016)
  17. Dinu, Daniel; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Großschädl, Johann; Biryukov, Alex: Design strategies for ARX with provable bounds: sparx and LAX (2016)
  18. Gérault, David; Lafourcade, Pascal: Related-key cryptanalysis of Midori (2016)
  19. Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu: Extended meet-in-the-middle attacks on some Feistel constructions (2016)
  20. Kondo, Kota; Sasaki, Yu; Iwata, Tetsu: On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants (2016)

1 2 3 next