The following pages link to (Q4934727):
Displayed 33 items.
- Relations between robustness and RKA security under public-key encryption (Q266278) (← links)
- Notions and relations for RKA-secure permutation and function families (Q540472) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Revisiting AES related-key differential attacks with constraint programming (Q1799563) (← links)
- Related-key security for pseudorandom functions beyond the linear barrier (Q1994635) (← links)
- Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle (Q2096604) (← links)
- Computing AES related-key differential characteristics with constraint programming (Q2289026) (← links)
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman (Q2293251) (← links)
- Clever Arbiters Versus Malicious Adversaries (Q2803661) (← links)
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions (Q2946437) (← links)
- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask (Q2947070) (← links)
- Improved Differential Cryptanalysis of CAST-128 and CAST-256 (Q2980843) (← links)
- SPF: A New Family of Efficient Format-Preserving Encryption Algorithms (Q2980846) (← links)
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model (Q3013081) (← links)
- Related-Key Cryptanalysis of Midori (Q3179490) (← links)
- Related-key attack on 5-round Kuznyechik (Q3383108) (← links)
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis (Q3452233) (← links)
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES (Q3452355) (← links)
- Higher Order Differential Attack of a CAST Cipher (Q4639437) (← links)
- Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications (Q4639496) (← links)
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices (Q5055965) (← links)
- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 (Q5385513) (← links)
- The Delicate Issues of Addition with Respect to XOR Differences (Q5452258) (← links)
- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs (Q5458221) (← links)
- 3D: A Three-Dimensional Block Cipher (Q5502767) (← links)
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions (Q5738969) (← links)
- On the Role of Key Schedules in Attacks on Iterated Ciphers (Q5862314) (← links)
- Related-key attacks on the compression function of Streebog (Q6051898) (← links)
- On the related-key attack security of authenticated encryption schemes (Q6134826) (← links)
- When messages are keys: is HMAC a dual-PRF? (Q6145965) (← links)
- And Rijndael? Automatic related-key differential analysis of Rijndael (Q6160824) (← links)
- Continuously non-malleable codes against bounded-depth tampering (Q6175984) (← links)