The MALICIOUS framework: embedding backdoors into tweakable block ciphers (Q2102066): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_9 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3048736713 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Malicious Hashing: Eve’s Variant of SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphers for MPC and FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3187642 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of SP Networks with Partial Non-Linear Layers / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual EC: A Standardized Back Door / rank
 
Normal rank
Property / cites work
 
Property / cites work: \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374925 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Differential Uniformity of Maps that May Hide an Algebraic Trapdoor / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear equivalence of block ciphers with partial non-linear layers: application to LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimized Interpolation Attacks on LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher-Order Cryptanalysis of LowMC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Block Ciphers That Are Easier to Mask: How Far Can We Go? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limited-Birthday Distinguishers for Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4222739 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409107 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweakable block ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4373648 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941813 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A family of trapdoor ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249261 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941862 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected Areas in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4450757 / rank
 
Normal rank

Latest revision as of 01:14, 31 July 2024

scientific article
Language Label Description Also known as
English
The MALICIOUS framework: embedding backdoors into tweakable block ciphers
scientific article

    Statements

    The MALICIOUS framework: embedding backdoors into tweakable block ciphers (English)
    0 references
    0 references
    0 references
    7 December 2022
    0 references
    tweakable block cipher
    0 references
    backdoor
    0 references
    differential cryptanalysis
    0 references
    LowMC-M
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers