• Piccolo

  • Referenced in 50 articles [sw13242]
  • blockcipher Piccolo supporting 80 and 128-bit keys. Adopting several novel design and implementation techniques ... level against known analyses including recent related-key differential attacks and meet-in-the-middle...
  • LBlock

  • Referenced in 45 articles [sw06569]
  • LBlock is 64-bit and the key size is 80-bit. Our security evaluation shows ... linear cryptanalysis, impossible differential cryptanalysis and related-key attacks etc. Furthermore, LBlock can be implemented...
  • tweakey

  • Referenced in 25 articles [sw12816]
  • Tweaks and keys for block ciphers: the tweakey framework. We propose the tweakey framework with ... block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating...
  • SKINNY

  • Referenced in 22 articles [sw17435]
  • model, but also in the related-key or related-tweak model. πš‚π™Ίπ™Έπ™½π™½πšˆ has flexible block/key/tweak...
  • FleXOR

  • Referenced in 7 articles [sw23224]
  • assumption on the underlying cipher/hash function (related-key security only, compared to related...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • design which provides strong protection against related-key differential attacks, a recent class of powerful ... attacks on AES. Related-key attacks are especially relevant when a block cipher is used...
  • MANTIS

  • Referenced in 3 articles [sw21866]
  • model, but also in the related-key or related-tweak model. πš‚π™Ίπ™Έπ™½π™½πšˆ has flexible block/key/tweak...
  • SAND

  • Referenced in 1 article [sw41021]
  • both single-key and related-key scenarios; (b) we also evaluated security against impossible differential...
  • SageMath

  • Referenced in 1970 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • Scream

  • Referenced in 4 articles [sw01287]
  • Scream: A software-efficient stream cipher. We report...
  • McEliece

  • Referenced in 250 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • COBRA

  • Referenced in 26 articles [sw02211]
  • COBRA: An optimized code for fast analysis of...
  • CLEFIA

  • Referenced in 66 articles [sw03047]
  • CLEFIA is an efficient, highly secure block cipher...
  • Gurobi

  • Referenced in 679 articles [sw04105]
  • GUROBI OPTIMIZER: State of the Art Mathematical Programming...
  • PRESENT

  • Referenced in 179 articles [sw08313]
  • PRESENT is a new ultra lightweight block cipher...
  • HIGHT

  • Referenced in 45 articles [sw08446]
  • HIGHT: A New Block Cipher Suitable for Low...
  • TWINE

  • Referenced in 36 articles [sw09705]
  • TWINE: A lightweight block cipher for multiple platforms...
  • mCrypton

  • Referenced in 19 articles [sw09729]
  • mCrypton – A Lightweight Block Cipher for Security of...
  • NOEKEON

  • Referenced in 24 articles [sw09730]
  • Compact hardware implementations of the block ciphers mCRYPTON...
  • Camellia

  • Referenced in 88 articles [sw09731]
  • Camellia: a 128-bit block cipher and suitable...