• FleXOR

  • Referenced in 10 articles [sw23224]
  • garbled circuit approach for 2-party secure computation use the free-XOR optimization of Kolesnikov ... assumption on the underlying cipher/hash function (related-key security only, compared to related...
  • Piccolo

  • Referenced in 52 articles [sw13242]
  • keys. Adopting several novel design and implementation techniques, Piccolo achieves both high security and notably ... offers a sufficient security level against known analyses including recent related-key differential attacks...
  • LBlock

  • Referenced in 47 articles [sw06569]
  • key size is 80-bit. Our security evaluation shows that LBlock can achieve enough security ... linear cryptanalysis, impossible differential cryptanalysis and related-key attacks etc. Furthermore, LBlock can be implemented...
  • tweakey

  • Referenced in 28 articles [sw12816]
  • resistant to related-key attacks. Our framework is simple, extends the key-alternating construction ... build a primitive with arbitrary tweak and key sizes, given the public round permutation ... round). Increasing the sizes renders the security analysis very difficult and thus we identify...
  • SKINNY

  • Referenced in 33 articles [sw17435]
  • performances, while proving in addition much stronger security guarantees with regards to differential/linear attacks ... only in the single-key model, but also in the related-key or related-tweak...
  • SAND

  • Referenced in 1 article [sw41021]
  • single-key and related-key scenarios; (b) we also evaluated security against impossible differential...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • class of powerful attacks on AES. Related-key attacks are especially relevant when a block ... function. In the course of proving the security of EPCBC, we could leverage...
  • MANTIS

  • Referenced in 3 articles [sw21866]
  • performances, while proving in addition much stronger security guarantees with regards to differential/linear attacks ... only in the single-key model, but also in the related-key or related-tweak...
  • DryGASCON

  • Referenced in 1 article [sw42325]
  • security. The reasons for this choice are twofold. The first reason is related ... weak keys and with certainty (optimal probability 1) for pairs of related keys. We show ... weak-key class depends on the size of the secret keys. In addition, we also ... find forgeries of DryGASCON256 in the related-key scenario. Forgery attacks succeeded without the reuse...
  • SageMath

  • Referenced in 2033 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • Scream

  • Referenced in 5 articles [sw01287]
  • Scream: A software-efficient stream cipher. We report...
  • McEliece

  • Referenced in 264 articles [sw02076]
  • Practical power analysis attacks on software implementations of...
  • COBRA

  • Referenced in 26 articles [sw02211]
  • COBRA: An optimized code for fast analysis of...
  • CLEFIA

  • Referenced in 69 articles [sw03047]
  • CLEFIA is an efficient, highly secure block cipher...
  • Gurobi

  • Referenced in 727 articles [sw04105]
  • GUROBI OPTIMIZER: State of the Art Mathematical Programming...
  • PRESENT

  • Referenced in 182 articles [sw08313]
  • PRESENT is a new ultra lightweight block cipher...
  • HIGHT

  • Referenced in 47 articles [sw08446]
  • HIGHT: A New Block Cipher Suitable for Low...
  • TWINE

  • Referenced in 37 articles [sw09705]
  • TWINE: A lightweight block cipher for multiple platforms...
  • mCrypton

  • Referenced in 19 articles [sw09729]
  • mCrypton – A Lightweight Block Cipher for Security of...
  • NOEKEON

  • Referenced in 25 articles [sw09730]
  • Compact hardware implementations of the block ciphers mCRYPTON...