Making the impossible possible (Q1747659): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible differential attack on 13-round Camellia-192 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method / rank
 
Normal rank
Property / cites work
 
Property / cites work: Biclique Cryptanalysis of the Full AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon / rank
 
Normal rank
Property / cites work
 
Property / cites work: Note on Impossible Differential Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: The LED Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiple Limited-Birthday Distinguishers and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941801 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Impossible Differential Attacks on AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Impossible Differential Cryptanalysis of 7-Round AES-128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible differential attacks on 13-round CLEFIA-128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537987 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improving impossible-differential attacks against Rijndael-160 and Rijndael-224 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On computational complexity of impossible differential cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: The 128-Bit Blockcipher CLEFIA (Extended Abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impossible Differential Cryptanalysis of CLEFIA / rank
 
Normal rank
Property / cites work
 
Property / cites work: LBlock: A Lightweight Block Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Results on Impossible Differential Cryptanalysis of Reduced AES / rank
 
Normal rank

Latest revision as of 13:29, 15 July 2024

scientific article
Language Label Description Also known as
English
Making the impossible possible
scientific article

    Statements

    Making the impossible possible (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    26 April 2018
    0 references
    block ciphers
    0 references
    impossible differential attacks
    0 references
    multiple differentials
    0 references
    key schedule
    0 references
    implementations
    0 references
    AES
    0 references
    CRYPTON
    0 references
    ARIA
    0 references
    CLEFIA
    0 references
    Camellia
    0 references
    LBlock
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers