COMET: COunter Mode Encryption with authentication Tag

[1]  Orr Dunkelman,et al.  Linear Cryptanalysis Using Low-bias Linear Approximations , 2017, IACR Cryptol. ePrint Arch..

[2]  Alex Biryukov,et al.  Differential Analysis of Block Ciphers SIMON and SPECK , 2014, FSE.

[3]  Yunwen Liu,et al.  Rotational-XOR Cryptanalysis of Reduced-round SPECK , 2017, IACR Cryptol. ePrint Arch..

[4]  Daesung Kwon,et al.  CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices , 2017, ICISC.

[5]  Tor Helleseth,et al.  Yoyo Tricks with AES , 2017, ASIACRYPT.

[6]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[7]  Thomas Peyrin,et al.  Human-readable Proof of the Related-Key Security of AES-128 , 2017, IACR Trans. Symmetric Cryptol..

[8]  Jason Smith,et al.  SIMON and SPECK: Block Ciphers for the Internet of Things , 2015, IACR Cryptol. ePrint Arch..

[9]  Kan Yasuda,et al.  Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[10]  Tomer Ashur,et al.  Linear cryptanalysis of reduced-round speck , 2016 .

[11]  Adi Shamir,et al.  Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities , 2019, Journal of Cryptology.

[12]  Christian Rechberger,et al.  A New Structural-Differential Property of 5-Round AES , 2017, EUROCRYPT.

[13]  Yehuda Lindell,et al.  Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation , 2017, IACR Cryptol. ePrint Arch..

[14]  Andrey Bogdanov,et al.  Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.

[15]  Jason Smith,et al.  The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[16]  Jason Smith,et al.  The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers , 2014, LightSec.

[17]  Lorenzo Grassi,et al.  Mixture Differential Cryptanalysis: New Approaches for Distinguishers and Attacks on round-reduced AES , 2018, IACR Cryptol. ePrint Arch..

[18]  Christian Rechberger,et al.  Subspace Trail Cryptanalysis and its Applications to AES , 2017, IACR Trans. Symmetric Cryptol..