“…The designers of Simeck give some other security analysis results including differential attacks (Biham and Shamir, 1991), linear attacks (Matsui, 1994), impossible differential attacks (Biham et al, 1999), etc., mainly following the attack procedure of SIMON due to their similarity. Recently, cryptanalysis covering more rounds are given (Bagheri, 2015;Kölbl and Roy, 2015). Kölbl and Roy give differentials with high probability of all three versions and launch differential attacks covering 19, 26 and 33 rounds of Simeck32/64, Simeck48/96 and Simeck64/128 respectively (Kölbl and Roy, 2015).…”