CLEFIA

CLEFIA is an efficient, highly secure block cipher which was presented in 2007. The block length is 128 bits, while key length of 128 bits, 192 bits, and 256 bits can be selected. To make the CLEFIA more reliable, the algorithm specification of CLEFIA is publicly available to enable public evaluations by cryptographers in worldwide. CLEFIA is the internationally-standardized cipher in ISO/IEC 29192 Lightweight cryptography.


References in zbMATH (referenced in 62 articles , 1 standard article )

Showing results 1 to 20 of 62.
Sorted by year (citations)

1 2 3 4 next

  1. Kölbl, Stefan; Tischhauser, Elmar; Derbez, Patrick; Bogdanov, Andrey: Troika: a ternary cryptographic hash function (2020)
  2. Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan: Revised version of block cipher CHAM (2020)
  3. Fan, Ruya; Cui, Ting; Chen, Shiwei; Jin, Chenhui; Zheng, Haoran: Multiset structural attack on generalized Feistel networks (2019)
  4. Yi, Haibo: Efficient systolic multiplications in composite fields for cryptographic systems (2019)
  5. Boura, Christina; Lallemand, Virginie; Naya-Plasencia, María; Suder, Valentin: Making the impossible possible (2018)
  6. Hong, Deukjo; Koo, Bonwook; Seo, Changho: Differential property of \textscPresent-like structure (2018)
  7. Koo, Bonwook; Roh, Dongyoung; Kim, Hyeonjin; Jung, Younghoon; Lee, Dong-Geon; Kwon, Daesung: CHAM: a family of lightweight block ciphers for resource-constrained devices (2018)
  8. Mazumder, Rashed; Miyaji, Atsuko; Su, Chunhua: Probably secure keyed-function based authenticated encryption schemes for big data (2017)
  9. Sasaki, Yu; Todo, Yosuke: New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers (2017)
  10. Yi, Wentan; Wu, Baofeng; Chen, Shaozhen; Lin, Dongdai: Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher (2017)
  11. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
  12. Carlet, Claude; Prouff, Emmanuel: Polynomial evaluation and side channel analysis (2016)
  13. Derbez, Patrick; Fouque, Pierre-Alain: Automatic search of meet-in-the-middle and impossible differential attacks (2016)
  14. Goudarzi, Dahmun; Rivain, Matthieu: On the multiplicative complexity of Boolean functions and bitsliced higher-order masking (2016)
  15. Guo, Zhiyuan; Wu, Wenling; Gao, Si: Constructing lightweight optimal diffusion primitives with Feistel structure (2016)
  16. Lin, Li; Wu, Wenling; Zheng, Yafei: Improved meet-in-the-middle distinguisher on Feistel schemes (2016)
  17. Lin, Li; Wu, Wenling; Zheng, Yafei: Automatic search for key-bridging technique: applications to LBlock and TWINE (2016)
  18. Luykx, Atul; Preneel, Bart; Tischhauser, Elmar; Yasuda, Kan: A MAC mode for lightweight block ciphers (2016)
  19. Tezcan, Cihangir; Selçuk, Ali Aydın: Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited (2016)
  20. Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis: The \textscSimonand \textscSpeckblock ciphers on AVR 8-bit microcontrollers (2015)

1 2 3 4 next