The following pages link to Fast Software Encryption (Q2946867):
Displayed 50 items.
- Improved Slender-Set Linear Cryptanalysis (Q2946922) (← links)
- Cryptanalysis of KLEIN (Q2946923) (← links)
- Branching Heuristics in Differential Collision Search with Applications to SHA-512 (Q2946924) (← links)
- On the Minimum Number of Multiplications Necessary for Universal Hash Functions (Q2946925) (← links)
- Collision Attack on 5 Rounds of Grøstl (Q2946926) (← links)
- Differential Cryptanalysis of Round-Reduced Simon and Speck (Q2946927) (← links)
- Differential Analysis of Block Ciphers SIMON and SPECK (Q2946928) (← links)
- Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds (Q2946929) (← links)
- Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Q2946930) (← links)
- Efficient Fuzzy Search on Encrypted Data (Q2946931) (← links)
- Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE (Q2946932) (← links)
- Improved Higher-Order Differential Attacks on MISTY1 (Q2946933) (← links)
- Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia (Q2946934) (← links)
- Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation (Q2946935) (← links)
- Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method (Q2946936) (← links)
- Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment (Q2946939) (← links)
- Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity (Q2946940) (← links)
- Comb to Pipeline: Fast Software Encryption Revisited (Q2946941) (← links)
- Security of the AES with a Secret S-Box (Q2946942) (← links)
- Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE (Q2946943) (← links)
- Linear Distinguishers in the Key-less Setting: Application to PRESENT (Q2946944) (← links)
- Differential-Linear Cryptanalysis of ICEPOLE (Q2946945) (← links)
- Cryptanalysis of JAMBU (Q2946946) (← links)
- Related-Key Forgeries for Prøst-OTR (Q2946947) (← links)
- Practical Cryptanalysis of the Open Smart Grid Protocol (Q2946948) (← links)
- Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes (Q2946949) (← links)
- The Related-Key Security of Iterated Even–Mansour Ciphers (Q2946950) (← links)
- Security of Keyed Sponge Constructions Using a Modular Proof Approach (Q2946951) (← links)
- GCM Security Bounds Reconsidered (Q2946953) (← links)
- Boosting OMD for Almost Free Authentication of Associated Data (Q2946954) (← links)
- Optimally Secure Tweakable Blockciphers (Q2946955) (← links)
- On Lightweight Stream Ciphers with Shorter Internal States (Q2946957) (← links)
- Lightweight MDS Involution Matrices (Q2946958) (← links)
- A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT (Q2946959) (← links)
- Rotational Cryptanalysis of ARX Revisited (Q2946961) (← links)
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation (Q2946962) (← links)
- New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA (Q2946963) (← links)
- A More Cautious Approach to Security Against Mass Surveillance (Q2946964) (← links)
- Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations (Q3013074) (← links)
- Search for Related-Key Differential Characteristics in DES-Like Ciphers (Q3013075) (← links)
- Multiple Differential Cryptanalysis: Theory and Practice (Q3013076) (← links)
- Fast Correlation Attacks: Methods and Countermeasures (Q3013077) (← links)
- Analysis of Reduced-SHAvite-3-256 v2 (Q3013078) (← links)
- An Improved Algebraic Attack on Hamsi-256 (Q3013079) (← links)
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function (Q3013080) (← links)
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model (Q3013081) (← links)
- On the Security of Hash Functions Employing Blockcipher Postprocessing (Q3013082) (← links)
- Breaking Grain-128 with Dynamic Cube Attacks (Q3013083) (← links)
- Cryptanalysis of the Knapsack Generator (Q3013084) (← links)
- Attack on Broadcast RC4 Revisited (Q3013085) (← links)