Design Strategies for ARX with Provable Bounds: Sparx and LAX (Q2958134): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(13 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: NOEKEON / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SIMECK / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: XTEA / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: ARIA / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Chaskey / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: ChaCha / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SPECK / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SIMON / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LED / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LEA / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_18 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2554376114 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New stream cipher designs. The eSTREAM finalists / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Wide Trail Design Strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Design Strategies Based on the AES Round Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: The LED Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046344 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structural Evaluation by Generalized Integral Property / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design Strategies for ARX with Provable Bounds: Sparx and LAX / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941816 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046620 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Linear Distinguishers for SNOW 2.0 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2003 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 08:23, 13 July 2024

scientific article
Language Label Description Also known as
English
Design Strategies for ARX with Provable Bounds: Sparx and LAX
scientific article

    Statements

    Design Strategies for ARX with Provable Bounds: Sparx and LAX (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    1 February 2017
    0 references
    ARX
    0 references
    block ciphers
    0 references
    differential cryptanalysis
    0 references
    linear cryptanalysis
    0 references
    lightweight
    0 references
    wide-trail strategy
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers