|
|
(8 intermediate revisions by 6 users not shown) |
Property / DOI | |
| | |
Property / DOI: 10.1007/s00145-015-9207-3 / rank | |
| Normal rank
| |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: NOEKEON / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: CRYPTON / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: LED / rank |
| | Normal rank |
| Property / MaRDI profile type |
| | |
| Property / MaRDI profile type: MaRDI publication profile / rank |
| | Normal rank |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1007/s00145-015-9207-3 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W2130566903 / rank |
| | Normal rank |
| Property / Wikidata QID |
| | |
| Property / Wikidata QID: Q121336330 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Indifferentiability of Key-Alternating Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Preimage Attacks on One-Block MD4, 63-Step MD5 and More / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941816 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Biclique Cryptanalysis of the Full AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Limitations of the Even-Mansour construction / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Minimalism in Cryptography: The Even-Mansour Scheme Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A construction of a cipher from a single pseudorandom permutation. / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3973158 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3549563 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Block Ciphers That Are Easier to Mask: How Far Can We Go? / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The LED Block Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A cryptanalytic time-memory trade-off / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Information Security and Cryptology - ICISC 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast software encryption. 6th international workshop, FSE `99. Rome, Italy, March 24--26, 1999. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Construct an Ideal Cipher from a Small Set of Public Permutations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941801 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Differential Analysis of the LED Block Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4537987 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4934709 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4943606 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1--5, 2013. Proceedings, Part I / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2--6, 2012. Proceedings / rank |
| | Normal rank |
| Property / DOI |
| | |
| Property / DOI: 10.1007/S00145-015-9207-3 / rank |
| | Normal rank |