DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Speck (cipher)

Speck (cipher)

  • Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPECK

    Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPECK

  • The Summation-Truncation Hybrid: Reusing Discarded Bits for Free

    The Summation-Truncation Hybrid: Reusing Discarded Bits for Free

  • Analysis of Block Encryption Algorithms Being Used in Devices with Restricted Amount of Technological Possibilities

    Analysis of Block Encryption Algorithms Being Used in Devices with Restricted Amount of Technological Possibilities

  • A Survey of ARX-Based Symmetric-Key Primitives

    A Survey of ARX-Based Symmetric-Key Primitives

  • Comparison of Hardware and Software Implementations of Selected Lightweight Block Ciphers

    Comparison of Hardware and Software Implementations of Selected Lightweight Block Ciphers

  • Simpleenc and Simpleencsmall – an Authenticated Encryption Mode for the Lightweight Setting?

    Simpleenc and Simpleencsmall – an Authenticated Encryption Mode for the Lightweight Setting?

  • Trade-Off of Security and Performance of Lightweight Block Ciphers in Industrial Wireless Sensor Networks Chao Pei1,2,3,Yangxiao4*,Weiliang1,2* and Xiaojia Han1,2,3

    Trade-Off of Security and Performance of Lightweight Block Ciphers in Industrial Wireless Sensor Networks Chao Pei1,2,3,Yangxiao4*,Weiliang1,2* and Xiaojia Han1,2,3

  • Block Ciphers for the Iot – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA Compared

    Block Ciphers for the Iot – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA Compared

  • SIMON and SPECK Implementation Guide 1 Some Definitions And

    SIMON and SPECK Implementation Guide 1 Some Definitions And

  • Simon and Speck: Block Ciphers for Internet of Things

    Simon and Speck: Block Ciphers for Internet of Things

  • Cryptanalysis of the Speck Family of Block Ciphers Revision from October 9, 2013

    Cryptanalysis of the Speck Family of Block Ciphers Revision from October 9, 2013

  • The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers⋆

    The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers⋆

  • View the Index

    View the Index

  • Arxiv:2004.10686V2 [Quant-Ph] 16 Sep 2020

    Arxiv:2004.10686V2 [Quant-Ph] 16 Sep 2020

  • Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning

    Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning

  • Comparison of Symmetric Key Algorithms for Iot Devices

    Comparison of Symmetric Key Algorithms for Iot Devices

  • Differential Analysis of Block Ciphers SIMON and SPECK

    Differential Analysis of Block Ciphers SIMON and SPECK

  • Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck

    Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck

Top View
  • Looking for the Loch Ness Monster by Stuart Clyburn
  • Grade 8 English Language Arts Practice Test
  • Further Observations on SIMON and SPECK Block Cipher Families
  • A Comparative Study of Rivest Cipher Algorithms
  • Will the Future Lightweight Standard Be Risc-V Friendly?
  • X5 User's Manual (DPD00000089)
  • Cryptography in Industrial Embedded Systems Our Experience of Needs and Constraints
  • Observations on the SIMON Block Cipher Family
  • Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
  • Grover on SPECK: Quantum Resource Estimates
  • Algorithms to Support the Evolution of Information Assurance Needs
  • Speck-R: an Ultra Light-Weight Cryptographic Scheme for Internet of Things
  • Breaking Speck Cryptosystem Using Correlation Power Analysis Attack
  • Optimal Prfs from Blockcipher Designs
  • A Guess-And-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher
  • 109 Lightweight Architectures for Reliable and Fault Detection Simon
  • Lightweight Architectures for Reliable and Fault Detection Simon and Speck Cryptographic Algorithms on FPGA
  • A SPECK Based 3G Authentication Algorithm for Download Onto Iot Security Modules


© 2024 Docslib.org    Feedback