On a generalization of substitution-permutation networks: the HADES design strategy (Q2119029): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 3 users not shown)
Property / cites work
 
Property / cites work: Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Feistel structures for MPC, and more / rank
 
Normal rank
Property / cites work
 
Property / cites work: MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphers for MPC and FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of SP Networks with Partial Non-Linear Layers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hybrid approach for solving multivariate systems over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential cryptanalysis of DES-like cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Biclique Cryptanalysis of the Full AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bruno Buchberger's PhD thesis 1965: An algorithm for finding the basis elements of the residue class ring of a zero dimensional polynomial ideal. Translation from the German / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provable security of (tweakable) block ciphers based on substitution-permutation networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ideals, Varieties, and Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: The block cipher Square / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Wide Trail Design Strategy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2908986 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear equivalence of block ciphers with partial non-linear layers: application to LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimized Interpolation Attacks on LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rasta: a cipher with low ANDdepth and few ANDs per bit / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Cryptanalysis of LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indifferentiability of Confusion-Diffusion Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Block Ciphers That Are Easier to Mask: How Far Can We Go? / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Structural-Differential Property of 5-Round AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: The interpolation attack on block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Overdrive: making SPDZ great again / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484885 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4146667 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934705 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4318725 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The cipher SHARK / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941810 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SHARK / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Square / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LowMC / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-45724-2_23 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2977846258 / rank
 
Normal rank

Latest revision as of 11:17, 28 July 2024

scientific article
Language Label Description Also known as
English
On a generalization of substitution-permutation networks: the HADES design strategy
scientific article

    Statements

    On a generalization of substitution-permutation networks: the HADES design strategy (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    23 March 2022
    0 references
    0 references
    \textsc{Hades} strategy
    0 references
    cryptographic permutations
    0 references
    secure multiparty computation (MPC)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references