Linked e-resources
Details
Table of Contents
The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers
The Multiplicative Complexity of Boolean Functions on Four and Five Variables
A Flexible and Compact Hardware Architecture for the SIMON Block Cipher
AES Smaller Than S-Box: Minimalism in Software Design on Low End Microcontrollers
Differential Factors: Improved Attacks on SERPENT
Ciphertext-Only Fault Attacks on PRESENT
Relating Undisturbed Bits to Other Properties of Substitution Boxes
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity.
The Multiplicative Complexity of Boolean Functions on Four and Five Variables
A Flexible and Compact Hardware Architecture for the SIMON Block Cipher
AES Smaller Than S-Box: Minimalism in Software Design on Low End Microcontrollers
Differential Factors: Improved Attacks on SERPENT
Ciphertext-Only Fault Attacks on PRESENT
Relating Undisturbed Bits to Other Properties of Substitution Boxes
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity.