647
Views
25
CrossRef citations to date
0
Altmetric
Original Articles

Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo

, &
Pages 2564-2580 | Received 20 Aug 2012, Accepted 10 Jan 2013, Published online: 18 Mar 2013

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Jongsung Kim, Yi Mu & Mohammad S. Obaidat. (2013) Advanced computer mathematics based cryptography and security technologies. International Journal of Computer Mathematics 90:12, pages 2512-2514.
Read now

Articles from other publishers (24)

Wen Chen, Lang Li, Ying Guo & Ying Huang. (2023) SAND-2: An optimized implementation of lightweight block cipher. Integration 91, pages 23-34.
Crossref
Ahmad Mustafa Mohamad Al-Aboosi, Samar Kamil, Siti Norul Huda Sheikh Abdullah & Khairul Akram Zainol Ariffin. (2021) Lightweight Cryptography for Resource Constraint Devices: Challenges and Recommendation. Lightweight Cryptography for Resource Constraint Devices: Challenges and Recommendation.
Vishal A. Thakor, Mohammad Abdur Razzaque & Muhammad R. A. Khandaker. (2021) Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. IEEE Access 9, pages 28177-28193.
Crossref
Bora Aslan, Füsun Yavuzer Aslan & M. Tolga Sakallı. (2020) Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications. Security and Communication Networks 2020, pages 1-15.
Crossref
Guoyong Han, Wenying Zhang, Zhaohui Xing, Hongluan Zhao & Jian Lian. (2019) Unbalanced biclique cryptanalysis of a full round Midori. IET Communications 13:5, pages 505-511.
Crossref
Guoyong Han, Hongluan Zhao & Chunquan Zhao. (2019) Unbalanced Biclique Cryptanalysis of Full-Round GIFT. IEEE Access 7, pages 144425-144432.
Crossref
Prakash Dey, Raghvendra Singh Rohit & Avishek Adhikari. (2018) Single key MITM attack and biclique cryptanalysis of full round Khudra. Journal of Information Security and Applications 41, pages 117-123.
Crossref
George Hatzivasilis, Konstantinos Fysarakis, Ioannis Papaefstathiou & Charalampos Manifavas. (2017) A review of lightweight block ciphers. Journal of Cryptographic Engineering 8:2, pages 141-184.
Crossref
Reza Montasari, Amin Hosseinian-Far, Richard Hill, Farshad Montaseri, Mak Sharma & Shahid Shabbir. (2018) Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?. International Journal of Organizational and Collective Intelligence 8:2, pages 32-59.
Crossref
Ya Liu, Liang Cheng, Zhiqiang Liu, Wei Li, Qingju Wang & Dawu Gu. (2017) Improved meet-in-the-middle attacks on reduced-round Piccolo. Science China Information Sciences 61:3.
Crossref
Seyyed Arash Azimi, Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri & Mohammad Reza Aref. (2018) Improved impossible differential and biclique cryptanalysis of HIGHT. International Journal of Communication Systems 31:1, pages e3382.
Crossref
Azza Zayed Alshamsi & Ezedin Salem Barka. (2017) Implementation of energy efficient/lightweight encryption algorithm for wireless body area networks. Implementation of energy efficient/lightweight encryption algorithm for wireless body area networks.
Guoyong Han & Wenying Zhang. (2017) Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo. Security and Communication Networks 2017, pages 1-12.
Crossref
Li-shi Fu, Chen-hui Jin & Xin-ran Li. (2016) Multidimensional zero-correlation linear cryptanalysis of lightweight block cipher Piccolo-128. Security and Communication Networks 9:17, pages 4520-4535.
Crossref
Azza Zayed Alshamsi, Ezedin Salem Barka & Mohamed Adel Serhani. (2016) Lightweight encryption algorithm in wireless body area network for e-health monitoring. Lightweight encryption algorithm in wireless body area network for e-health monitoring.
Mohammad Zare Ahangarkolaei, Seyed Reza Hoseini Najarkolaei, Siavash Ahmadi & Mohammad Reza Aref. (2016) Zero correlation linear attack on reduced round Piccolo-80. Zero correlation linear attack on reduced round Piccolo-80.
Zheng Gong, Shusheng Liu, Yamin Wen, Yiyuan Luo & Weidong Qiu. (2016) Biclique cryptanalysis using balanced complete bipartite subgraphs. Science China Information Sciences 59:4.
Crossref
Mohamed Tolba, Ahmed Abdelkhalek & Amr M. Youssef. 2016. Lightweight Cryptography for Security and Privacy. Lightweight Cryptography for Security and Privacy 3 20 .
Mickaël Cazorla, Sylvain Gourgeon, Kévin Marquet & Marine Minier. (2015) Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller. Security and Communication Networks 8:18, pages 3564-3579.
Crossref
Mohammed A. Saleh, Nooritawati Md. Tahir, Ezril Hisham & Habibah Hashim. (2015) An analysis and comparison for popular video encryption algorithms. An analysis and comparison for popular video encryption algorithms.
Yasutaka Igarashi, Ryutaro Sueyoshi, Toshinobu Kaneko & Takayasu Fuchida. 2015. Information Science and Applications. Information Science and Applications 423 429 .
Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri & Mohammad Reza Aref. (2014) Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT. IEEE Transactions on Information Forensics and Security 9:10, pages 1641-1652.
Crossref
Seyyed Arash Azimi, Zahra Ahmadian, Javad Mohajeri & Mohammad Reza Aref. (2014) Impossible differential cryptanalysis of Piccolo lightweight block cipher. Impossible differential cryptanalysis of Piccolo lightweight block cipher.
Junghwan Song, Kwanhyung Lee & Younghoon Jung. (2014) The Security Weakness of Block Cipher Piccolo against Fault Analysis. International Journal of Distributed Sensor Networks 10:3, pages 842675.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.