• LBlock

  • Referenced in 47 articles [sw06569]
  • LBlock is 64-bit and the key size is 80-bit. Our security evaluation shows ... linear cryptanalysis, impossible differential cryptanalysis and related-key attacks etc. Furthermore, LBlock can be implemented...
  • Piccolo

  • Referenced in 52 articles [sw13242]
  • against known analyses including recent related-key differential attacks and meet-in-the-middle attacks...
  • tweakey

  • Referenced in 28 articles [sw12816]
  • block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • against related-key differential attacks, a recent class of powerful attacks on AES. Related...
  • SKINNY

  • Referenced in 33 articles [sw17435]
  • stronger security guarantees with regards to differential/linear attacks. In particular, unlike πš‚π™Έπ™Όπ™Ύπ™½, we are able ... only in the single-key model, but also in the related-key or related-tweak...
  • DryGASCON

  • Referenced in 1 article [sw42325]
  • attacks on DryGASCON128 with an optimal probability (2^{- 13}) for a class of weak keys ... related keys. We show that the number of elements from the weak-key class depends ... forgeries of DryGASCON256 in the related-key scenario. Forgery attacks succeeded without the reuse...
  • SAND

  • Referenced in 1 article [sw41021]
  • differential and linear attacks, and in both single-key and related-key scenarios ... against impossible differential and zero-correlation linear attacks. This better understanding of the security enables...
  • MANTIS

  • Referenced in 3 articles [sw21866]
  • stronger security guarantees with regards to differential/linear attacks. In particular, unlike πš‚π™Έπ™Όπ™Ύπ™½, we are able ... only in the single-key model, but also in the related-key or related-tweak...
  • SageMath

  • Referenced in 2047 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • Scream

  • Referenced in 5 articles [sw01287]
  • Scream: A software-efficient stream cipher. We report...
  • McEliece

  • Referenced in 265 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • COBRA

  • Referenced in 26 articles [sw02211]
  • COBRA: An optimized code for fast analysis of...
  • CLEFIA

  • Referenced in 69 articles [sw03047]
  • CLEFIA is an efficient, highly secure block cipher...
  • Gurobi

  • Referenced in 740 articles [sw04105]
  • GUROBI OPTIMIZER: State of the Art Mathematical Programming...
  • PRESENT

  • Referenced in 182 articles [sw08313]
  • PRESENT is a new ultra lightweight block cipher...
  • HIGHT

  • Referenced in 47 articles [sw08446]
  • HIGHT: A New Block Cipher Suitable for Low...
  • TWINE

  • Referenced in 37 articles [sw09705]
  • TWINE: A lightweight block cipher for multiple platforms...
  • mCrypton

  • Referenced in 19 articles [sw09729]
  • mCrypton – A Lightweight Block Cipher for Security of...
  • NOEKEON

  • Referenced in 25 articles [sw09730]
  • Compact hardware implementations of the block ciphers mCRYPTON...
  • Camellia

  • Referenced in 88 articles [sw09731]
  • Camellia: a 128-bit block cipher and suitable...