Simon is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013.[2] Simon has been optimized for performance in hardware implementations, while its sister algorithm, Speck, has been optimized for software implementations. Simon is a balanced Feistel cipher (wikipedia).

References in zbMATH (referenced in 92 articles )

Showing results 1 to 20 of 92.
Sorted by year (citations)

1 2 3 4 5 next

  1. Bhattacharjee, Arghya; López, Cuauhtemoc Mancillas; List, Eik; Nandi, Mridul: The Oribatida v1.3 family of lightweight authenticated encryption schemes (2021)
  2. Bhaumik, Ritam; Nandi, Mridul; Raychaudhuri, Anik: Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff (2021)
  3. Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick: The \textttDeoxysAEAD family (2021)
  4. Sadeghi, Sadegh; Rijmen, Vincent; Bagheri, Nasour: Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK (2021)
  5. Song, Ling; Tu, Yi; Shi, Danping; Hu, Lei: Security analysis of subterranean 2.0 (2021)
  6. Ye, Chen-Dong; Tian, Tian; Zeng, Fan-Yang: The MILP-aided conditional differential attack and its application to Trivium (2021)
  7. Ashur, Tomer; Beyne, Tim; Rijmen, Vincent: Revisiting the wrong-key-randomization hypothesis (2020)
  8. Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul: Blockcipher-based authenticated encryption: how small can we go? (2020)
  9. Gerault, David; Lafourcade, Pascal; Minier, Marine; Solnon, Christine: Computing AES related-key differential characteristics with constraint programming (2020)
  10. Liu, Yunwen; Zhang, Wenying; Sun, Bing; Rijmen, Vincent; Liu, Guoqiang; Li, Chao; Fu, Shaojing; Cao, Meichun: The phantom of differential characteristics (2020)
  11. Lu, Jinyu; Liu, Yunwen; Ashur, Tomer; Sun, Bing; Li, Chao: Rotational-XOR cryptanalysis of Simon-like block ciphers (2020)
  12. Malyshev, F. M.: Differential characteristics of base operations in ARX-ciphers (2020)
  13. Peng, Xinhang; Sun, Bing; Li, Chao: Simon algorithm key-recovery attack on SIMON (2020)
  14. Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan: Revised version of block cipher CHAM (2020)
  15. Zhao, Boxin; Dong, Xiaoyang; Meier, Willi; Jia, Keting; Wang, Gaoli: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (2020)
  16. Bi, Wenquan; Dong, Xiaoyang; Li, Zheng; Zong, Rui; Wang, Xiaoyun: MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (2019)
  17. ElSheikh, Muhammad; Tolba, Mohamed; Youssef, Amr M.: Integral attacks on round-reduced Bel-T-256 (2019)
  18. Gohr, Aron: Improving attacks on round-reduced Speck32/64 using deep learning (2019)
  19. Le, Duc-Phong; Yeo, Sze Ling; Khoo, Khoongming: Algebraic differential fault analysis on Simon block cipher (2019)
  20. Li, Yanbin; Wang, Meiqin: Cryptanalysis of MORUS (2019)

1 2 3 4 5 next