Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(7 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: AEGIS / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Saturnin / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Square / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Camellia / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: tweakey / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_21 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4225883647 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic search of meet-in-the-middle preimage attacks on AES-like hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical attacks on reduced-round AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) / rank
 
Normal rank
Property / cites work
 
Property / cites work: QCB: efficient quantum-secure authenticated encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250830 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778856 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046332 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279560 / rank
 
Normal rank
Property / cites work
 
Property / cites work: PAEQ: Parallelizable Permutation-Based Authenticated Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778859 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941816 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear hulls with correlation zero and linear cryptanalysis of block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another View of the Division Property / rank
 
Normal rank
Property / cites work
 
Property / cites work: Boomerang Connectivity Table: a new cryptanalysis tool / rank
 
Normal rank
Property / cites work
 
Property / cites work: The block cipher Square / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Meet-in-the-Middle Attack on 8-Round AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design Strategies for ARX with Provable Bounds: Sparx and LAX / rank
 
Normal rank
Property / cites work
 
Property / cites work: Square Attack on 7-Round Kiasu-BC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC / rank
 
Normal rank
Property / cites work
 
Property / cites work: New slide attacks on almost self-similar ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Single-Key Attacks on 8-Round AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic mixture differential cryptanalysis on round-reduced AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228473 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simpira v2: A Family of Efficient Permutations Using the AES Round Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: ZMAC: a fast tweakable block cipher mode for highly secure message authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Design Strategies Based on the AES Round Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: 3D: A Three-Dimensional Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking Symmetric Cryptosystems Using Quantum Period Finding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934705 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: The MALICIOUS framework: embedding backdoors into tweakable block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Yoyo tricks with AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved related-tweakey boomerang attacks on Deoxys-BC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structural Evaluation by Generalized Integral Property / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941810 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Upper bound of the length of truncated impossible differentials for AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: More accurate results on the provable security of AES against impossible differential cryptanalysis / rank
 
Normal rank

Latest revision as of 14:19, 29 July 2024

scientific article
Language Label Description Also known as
English
Pholkos -- efficient large-state tweakable block ciphers from the AES round function
scientific article

    Statements

    Pholkos -- efficient large-state tweakable block ciphers from the AES round function (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    6 July 2022
    0 references
    AES
    0 references
    tweakable block cipher
    0 references
    bigger birthday security
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers