Simon is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013.[2] Simon has been optimized for performance in hardware implementations, while its sister algorithm, Speck, has been optimized for software implementations. Simon is a balanced Feistel cipher (wikipedia).

References in zbMATH (referenced in 83 articles )

Showing results 1 to 20 of 83.
Sorted by year (citations)

1 2 3 4 5 next

  1. Ashur, Tomer; Beyne, Tim; Rijmen, Vincent: Revisiting the wrong-key-randomization hypothesis (2020)
  2. Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul: Blockcipher-based authenticated encryption: how small can we go? (2020)
  3. Gerault, David; Lafourcade, Pascal; Minier, Marine; Solnon, Christine: Computing AES related-key differential characteristics with constraint programming (2020)
  4. Kales, Daniel; Ramacher, Sebastian; Rechberger, Christian; Walch, Roman; Werner, Mario: Efficient FPGA implementations of LowMC and \textscPicnic (2020)
  5. Liu, Yunwen; Zhang, Wenying; Sun, Bing; Rijmen, Vincent; Liu, Guoqiang; Li, Chao; Fu, Shaojing; Cao, Meichun: The phantom of differential characteristics (2020)
  6. Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan: Revised version of block cipher CHAM (2020)
  7. Zhao, Boxin; Dong, Xiaoyang; Meier, Willi; Jia, Keting; Wang, Gaoli: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (2020)
  8. Bi, Wenquan; Dong, Xiaoyang; Li, Zheng; Zong, Rui; Wang, Xiaoyun: MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (2019)
  9. ElSheikh, Muhammad; Tolba, Mohamed; Youssef, Amr M.: Integral attacks on round-reduced Bel-T-256 (2019)
  10. Gohr, Aron: Improving attacks on round-reduced Speck32/64 using deep learning (2019)
  11. Le, Duc-Phong; Yeo, Sze Ling; Khoo, Khoongming: Algebraic differential fault analysis on Simon block cipher (2019)
  12. Li, Yanbin; Wang, Meiqin: Cryptanalysis of MORUS (2019)
  13. Neves, Samuel; Araujo, Filipe: An observation on NORX, BLAKE2, and ChaCha (2019)
  14. Sadeghi, Sadegh; Bagheri, Nasour: Security analysis of SIMECK block cipher against related-key impossible differential (2019)
  15. Wang, Qian; Jin, Chenhui: More accurate results on the provable security of AES against impossible differential cryptanalysis (2019)
  16. Alsalami, Yousuf: Constructions with high algebraic degree of differentially 4-uniform ((n, n - 1))-functions and differentially 8-uniform ((n, n - 2))-functions (2018)
  17. Koo, Bonwook; Roh, Dongyoung; Kim, Hyeonjin; Jung, Younghoon; Lee, Dong-Geon; Kwon, Daesung: CHAM: a family of lightweight block ciphers for resource-constrained devices (2018)
  18. Liu, Yunwen; Rijmen, Vincent; Leander, Gregor: Nonlinear diffusion layers (2018)
  19. Abdelkhalek, Ahmed; Tolba, Mohamed; Youssef, Amr M.: Impossible differential attack on reduced round SPARX-64/128 (2017)
  20. Adomnicai, Alexandre; Fournier, Jacques J. A.; Masson, Laurent: Bricklayer attack: a side-channel analysis on the ChaCha quarter round (2017)

1 2 3 4 5 next