KATAN

KATAN and KTANTAN — a family of small and efficient hardware-oriented block ciphers. KATAN/KTANTAN is a family of hardware oriented block ciphers designed by Chrstophe de Canniere, Orr Dunkelman, and Miroslav Knezevic. Both KATAN and KTANTAN have three variants each, of 32-bit, 48-bit, or 64-bit block. All ciphers share the same key length (of 80 bits), where the only difference between KATAN-n and KTANTAN-n is the key schedule. The resulting ciphers are exteremly efficient in hardware, and offer a set of suitable solution for low-end devices that need encryption (such as RFID tags).


References in zbMATH (referenced in 51 articles )

Showing results 1 to 20 of 51.
Sorted by year (citations)

1 2 3 next

  1. Ye, Chen-Dong; Tian, Tian; Zeng, Fan-Yang: The MILP-aided conditional differential attack and its application to Trivium (2021)
  2. Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul: Blockcipher-based authenticated encryption: how small can we go? (2020)
  3. Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan: Revised version of block cipher CHAM (2020)
  4. Dey, Sabyasachi; Roy, Tapabrata; Sarkar, Santanu: Some results on Fruit (2019)
  5. Tian, Tian; Zhang, Jia-Min; Qi, Wen-Feng: On the uniqueness of a type of cascade connection representations for NFSRs (2019)
  6. Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (2018)
  7. Hamann, Matthias; Krause, Matthias; Meier, Willi; Zhang, Bin: Design and analysis of small-state grain-like stream ciphers (2018)
  8. Koo, Bonwook; Roh, Dongyoung; Kim, Hyeonjin; Jung, Younghoon; Lee, Dong-Geon; Kwon, Daesung: CHAM: a family of lightweight block ciphers for resource-constrained devices (2018)
  9. Reparaz, Oscar; De Meyer, Lauren; Bilgin, Begül; Arribas, Victor; Nikova, Svetla; Nikov, Ventzislav; Smart, Nigel: CAPA: the spirit of beaver against physical attacks (2018)
  10. de Groot, Wouter; Papagiannopoulos, Kostas; de La Piedra, Antonio; Schneider, Erik; Batina, Lejla: Bitsliced masking and ARM: friends or foes? (2017)
  11. Dubrova, Elena; Hell, Martin: Espresso: a stream cipher for 5G wireless communication systems (2017)
  12. Hao, Yonglin; Meier, Willi: Truncated differential based known-key attacks on round-reduced SIMON (2017)
  13. Zheng, Yafei; Wu, Wenling: Biclique attack of block cipher \textttSKINNY (2017)
  14. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
  15. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Exploring energy efficiency of lightweight block ciphers (2016)
  16. Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng: The (\mathttSKINNY) family of block ciphers and its low-latency variant (\mathttMANTIS) (2016)
  17. Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (2016)
  18. Canteaut, Anne; Duval, Sébastien; Leurent, Gaëtan: Construction of lightweight S-boxes using Feistel and MISTY structures (2016)
  19. Chen, Cong; Farmani, Mohammad; Eisenbarth, Thomas: A tale of two shares: why two-share threshold implementation seems worthwhile -- and why it Is not (2016)
  20. Chen, Jiageng; Teh, Je Sen; Su, Chunhua; Samsudin, Azman; Fang, Junbin: Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework (2016)

1 2 3 next