The following pages link to (Q4279560):
Displaying 50 items.
- On the relationship between resilient Boolean functions and linear branch number of S-boxes (Q2179400) (← links)
- If a generalised butterfly is APN then it operates on 6 bits (Q2179486) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- The phantom of differential characteristics (Q2205883) (← links)
- Efficient recursive diffusion layers for block ciphers and hash functions (Q2344048) (← links)
- Difference of function on vector space over \(\mathbb F\) (Q2344195) (← links)
- On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations (Q2349621) (← links)
- Differential entropy analysis of the IDEA block cipher (Q2349636) (← links)
- Projective aspects of the AES inversion (Q2384013) (← links)
- Differential-linear cryptanalysis revisited (Q2408590) (← links)
- Integral cryptanalysis on full MISTY1 (Q2408592) (← links)
- A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\) (Q2414052) (← links)
- Differential attack on five rounds of the SC2000 block cipher (Q2434544) (← links)
- Linear hulls with correlation zero and linear cryptanalysis of block ciphers (Q2439738) (← links)
- Multi-objective optimisation of bijective S-boxes (Q2493290) (← links)
- The designs of S-boxes by simulated annealing (Q2493292) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256 (Q2628121) (← links)
- Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey (Q2672454) (← links)
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC (Q2692352) (← links)
- Cryptanalysis of Ascon (Q2790053) (← links)
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA (Q2794507) (← links)
- Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework (Q2817822) (← links)
- Pen and Paper Arguments for SIMON and SIMON-like Designs (Q2827732) (← links)
- Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices (Q2835604) (← links)
- Cryptographic Analysis of All 4 × 4-Bit S-Boxes (Q2889866) (← links)
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher (Q2889869) (← links)
- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask (Q2947070) (← links)
- Nonlinear Invariant Attack (Q2953771) (← links)
- Improved Differential Cryptanalysis of CAST-128 and CAST-256 (Q2980843) (← links)
- SPF: A New Family of Efficient Format-Preserving Encryption Algorithms (Q2980846) (← links)
- Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations (Q3013074) (← links)
- Multiple Differential Cryptanalysis: Theory and Practice (Q3013076) (← links)
- Breaking Grain-128 with Dynamic Cube Attacks (Q3013083) (← links)
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes (Q3013096) (← links)
- Differential-Multiple Linear Cryptanalysis (Q3056878) (← links)
- Mars Attacks! Revisited: (Q3104728) (← links)
- Рассеивающие свойства XSLP-шифров (Q3381840) (← links)
- О свойствах блочных алгоритмов шифрования Магма и Кузнечик в режиме CTR с преобразованием ключа методом CryptoPro Key Meshing (Q3381877) (← links)
- Полное описание одного класса MDS-матриц над конечным полем характеристики 2 (Q3381890) (← links)
- Practical significance of security bounds for standardized internally re-keyed block cipher modes (Q3383060) (← links)
- Linear and differential cryptanalysis: Another viewpoint (Q3383111) (← links)
- О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования (Q3383125) (← links)
- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails (Q3454589) (← links)
- The Stream Cipher HC-128 (Q3510913) (← links)
- Cryptanalysis of Reduced-Round SMS4 Block Cipher (Q3511164) (← links)
- Impossible Differential Cryptanalysis of CLEFIA (Q3525691) (← links)
- Attacks on the DECT Authentication Mechanisms (Q3623034) (← links)
- Exhaustive Evaluation of Radius 2 Toggle Rules for a Variable-Length Cryptographic Cellular Automata-Based Model (Q4931219) (← links)
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices (Q5055965) (← links)