|
|
(11 intermediate revisions by 5 users not shown) |
Property / DOI | |
| | |
Property / DOI: 10.1007/s10623-021-00850-2 / rank | |
| Normal rank
| |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: NOEKEON / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: Midori / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: Gimli / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: Salsa20 / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: Chaskey / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: ChaCha / rank |
| | Normal rank |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: Keccak / rank |
| | Normal rank |
| Property / MaRDI profile type |
| | |
| Property / MaRDI profile type: MaRDI publication profile / rank |
| | Normal rank |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1007/s10623-021-00850-2 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W3130355687 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A practical attack on KeeLoq / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security of Keyed Sponge Constructions Using a Modular Proof Approach / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Inside the Hypercube / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: NORX: Parallel and Scalable AEAD / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: BLAKE2: Simpler, Smaller, Fast as MD5 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Midori: A Block Cipher for Low Energy / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient slide attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: In How Many Ways Can You Write Rijndael? / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Proving resistance against invariant attacks: how to choose the round constants / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in cryptology -- CT-RSA 2014. The cryptographer's track at the RSA conference 2014, San Francisco, CA, USA, February 25--28, 2014. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Keccak / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Indifferentiability of the Sponge Construction / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Block cipher invariants as eigenvectors of correlation matrices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941816 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On defining sets for projective planes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Another Look at Complementation Properties / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Short codes with a given covering radius / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Salsa20 Core Function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Minimizing the Two-Round Even-Mansour Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tight Security Bounds for Key-Alternating Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Sum-free sets in vector spaces over \(GF(2)\) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tweaking Even-Mansour Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4342497 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Full-state keyed duplex with built-in multi-user support / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4537988 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2760977 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Constructions and families of covering codes and saturated sets of points in projective geometry / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Minimal 1-saturating sets and complete caps in binary projective spaces. / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of Ascon / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Minimalism in Cryptography: The Even-Mansour Scheme Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Almost universal forgery attacks on AES-based MAC's / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4314029 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Related-Key Security of Iterated Even–Mansour Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Birthday paradox, coupon collectors, caching algorithms and self- organizing search / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Linear codes with covering radius 2 and other new covering codes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The geometry of covering codes: small complete caps and saturating sets in Galois spaces / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simpira v2: A Family of Efficient Permutations Using the AES Round Function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Analysis of BLAKE2 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The PHOTON Family of Lightweight Hash Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Robust Authenticated-Encryption AEZ and the Problem That It Solves / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical Cryptanalysis of PAES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: PRINTcipher: A Block Cipher for IC-Printing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Software Performance of Authenticated-Encryption Modes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8--11, 2015. Revised selected papers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Connecting tweakable and multi-key blockcipher security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4409107 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Iterated Random Permutation Problem with Applications to Cascade Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multi-key Security: The Even-Mansour Construction Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4871720 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The “Coefficients H” Technique / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Differential Attacks for ECHO and Grøstl / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14--18, 2011. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Nonlinear Invariant Attack / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Saturated configurations of points in projective Galois spaces / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advanced Encryption Standard – AES / rank |
| | Normal rank |
| Property / DOI |
| | |
| Property / DOI: 10.1007/S10623-021-00850-2 / rank |
| | Normal rank |