|
|
(5 intermediate revisions by 3 users not shown) |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: KATAN / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: KTANTAN / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: Blowfish / rank |
| | Normal rank |
| Property / MaRDI profile type |
| | |
| Property / MaRDI profile type: MaRDI publication profile / rank |
| | Normal rank |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_17 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W2206761661 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Preimage Attacks on One-Block MD4, 63-Step MD5 and More / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Slide Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26--28, 2007. Revised selected papers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941816 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3374941 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3722412 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Meet-in-the-Middle Attack on 8-Round AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Meet-in-the-Middle Attacks on AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Single-Key Attacks on 8-Round AES-192 and AES-256 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Meet-in-the-Middle Attacks on Reduced-Round DES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Practical Attack on KeeLoq / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Reflection Cryptanalysis of Some Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A New Class of Weak Keys for Blowfish / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast Software Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A (Second) Preimage Attack on the GOST Hash Function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of the GOST Hash Function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10--13, 2008. Revised selected papers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: 256 Bit Standardized Crypto for 650 GE – GOST Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Finding Preimages in Full MD5 Faster Than Exhaustive Search / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4499412 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4274294 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2762766 / rank |
| | Normal rank |