In cryptography, XTEA (eXtended TEA) is a block cipher designed to correct weaknesses in TEA. The cipher’s designers were David Wheeler and Roger Needham of the Cambridge Computer Laboratory, and the algorithm was presented in an unpublished technical report in 1997 (Needham and Wheeler, 1997). It is not subject to any patents.[1] Like TEA, XTEA is a 64-bit block Feistel cipher with a 128-bit key and a suggested 64 rounds. Several differences from TEA are apparent, including a somewhat more complex key-schedule and a rearrangement of the shifts, XORs, and additions. (wikipedia)

References in zbMATH (referenced in 37 articles )

Showing results 1 to 20 of 37.
Sorted by year (citations)

1 2 next

  1. Sun, Ling; Chen, Huaifeng; Wang, Meiqin: Zero-correlation attacks: statistical models independent of the number of approximations (2018)
  2. Dinu, Daniel; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Großschädl, Johann; Biryukov, Alex: Design strategies for ARX with provable bounds: \textscSparxand \textscLAX (2016)
  3. Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
  4. Karakoç, F.; Demirci, H.; Harmancı, A. E.: AKF: a key alternating Feistel scheme for lightweight cipher designs (2015)
  5. Kircanski, Aleksandar: Analysis of boomerang differential trails via a SAT-based constraint solver URSA (2015)
  6. Machicao, Jeaneth; Baetens, Jan M.; Marco, Anderson G.; De Baets, Bernard; Bruno, Odemir M.: A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems (2015)
  7. Biryukov, Alex; Velichkov, Vesselin: Automatic search for differential trails in ARX ciphers (2014)
  8. Huang, Jialin; Lai, Xuejia: Revisiting key schedule’s diffusion in relation with round function’s diffusion (2014)
  9. Huang, Jialin; Lai, Xuejia: What is the effective key length for a block cipher: an attack on every practical block cipher (2014)
  10. Karroumi, Mohamed; Richard, Benjamin; Joye, Marc: Addition with blinded operands (2014)
  11. Wen, Long; Wang, Meiqin; Bogdanov, Andrey; Chen, Huaifeng: Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard (2014)
  12. Cirani, Simone; Ferrari, Gianluigi; Veltri, Luca: Enforcing security mechanisms in the IP-based Internet of things: an algorithmic overview (2013)
  13. Isobe, Takanori; Shibutani, Kyoji: All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach (2013)
  14. Song, Junghwan; Lee, Kwanhyung; Lee, Hwanjin: Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo (2013)
  15. Bogdanov, Andrey; Wang, Meiqin: Zero correlation linear cryptanalysis with reduced data complexity (2012)
  16. Chen, Jiazhe; Wang, Meiqin; Preneel, Bart: Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT (2012)
  17. Isobe, Takanori; Shibutani, Kyoji: Security analysis of the lightweight block ciphers XTEA, LED and Piccolo (2012)
  18. Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo: Three-subset meet-in-the-middle attack on reduced XTEA (2012)
  19. Mouha, Nicky; Velichkov, Vesselin; De Cannière, Christophe; Preneel, Bart: The differential analysis of S-functions (2011)
  20. Plos, Thomas; Groß, Hannes; Feldhofer, Martin: Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags (2011)

1 2 next