The block cipher Square
From MaRDI portal
Publication:4639337
DOI10.1007/BFB0052343zbMath1385.94025MaRDI QIDQ4639337
Joan Daemen, Vincent Rijmen, Lars R. Knudsen
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Related Items (only showing first 100 items - show all)
A new method for impossible differential cryptanalysis of 8-round advanced encryption standard ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ SQUARE attack on block ciphers with low algebraic degree ⋮ \(k\)-configurations ⋮ Applications of design theory for the constructions of MDS matrices for lightweight cryptography ⋮ Security evaluation of MISTY structure with SPN round function ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers ⋮ $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms ⋮ Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions ⋮ Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis ⋮ Integral Cryptanalysis on Full MISTY1 ⋮ Automatic search for bit-based division property ⋮ Impossible differential cryptanalysis of advanced encryption standard ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Mixture integral attacks on reduced-round AES with a known/secret S-box ⋮ Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ The Missing Difference problem, and its applications to counter mode encryption ⋮ Survey on recent trends towards generalized differential and boomerang uniformities ⋮ General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher ⋮ Structural cryptanalysis of SASAS ⋮ Integral cryptanalysis on full MISTY1 ⋮ Efficient slide attacks ⋮ Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher ⋮ Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 ⋮ Security Analysis of PRINCE ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ Improved key-recovery attacks on reduced-round WEM-8 ⋮ Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ Lower bounds on the degree of block ciphers ⋮ The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ A Unified Approach to Related-Key Attacks ⋮ A Meet-in-the-Middle Attack on 8-Round AES ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ Square reflection cryptanalysis of 5-round Feistel networks with permutations ⋮ Integral distinguishers for reduced-round Stribog ⋮ A Five-Round Algebraic Property of the Advanced Encryption Standard ⋮ New Applications of Differential Bounds of the SDS Structure ⋮ Known-Key Distinguishers for Some Block Ciphers ⋮ Integral attacks on round-reduced Bel-T-256 ⋮ Finding integral distinguishers with ease ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ Lightweight MDS Generalized Circulant Matrices ⋮ Bit-Based Division Property and Application to Simon Family ⋮ Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Statistical integral attack on CAST-256 and IDEA ⋮ Statistical integral distinguisher with multi-structure and its application on AES-like ciphers ⋮ Generation algorithm of a sort of P-permutations ⋮ On Integral Distinguishers of Rijndael Family of Ciphers ⋮ Unnamed Item ⋮ Impossible differential cryptanalysis using matrix method ⋮ A New Structural-Differential Property of 5-Round AES ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Multi-objective optimisation of bijective S-boxes ⋮ On some probabilistic approximations for AES-like S-boxes ⋮ Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows ⋮ Distinguishing properties and applications of higher order derivatives of Boolean functions ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure ⋮ Analysis of the CAESAR Candidate Silver ⋮ A Statistical Saturation Attack against the Block Cipher PRESENT ⋮ Modeling for three-subset division property without unknown subset ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Показатели рассеивания линейной среды AES-подобных алгоритмов шифрования ⋮ Differential and linear cryptanalysis for 2-round spns ⋮ On some properties of an XSL-network ⋮ Related-key attack on 5-round Kuznyechik ⋮ Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 ⋮ New slide attacks on almost self-similar ciphers ⋮ Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ Square Attack on 7-Round Kiasu-BC ⋮ PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers ⋮ On the (im)possibility of improving the round diffusion of generalized Feistel structures ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ New criteria for linear maps in AES-like ciphers ⋮ A $$2^{70}$$ Attack on the Full MISTY1 ⋮ New Insights on AES-Like SPN Ciphers ⋮ Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices ⋮ Another View of the Division Property ⋮ Revisiting Gilbert's known-key distinguisher ⋮ 3D: A Three-Dimensional Block Cipher ⋮ New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers ⋮ Integral characteristics by keyspace partitioning ⋮ Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense ⋮ Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- On the distribution of characteristics in bijective mappings
- Markov Ciphers and Differential Cryptanalysis
- Truncated differentials of SAFER
- The cipher SHARK
- Attacks on block ciphers of low algebraic degree
This page was built for publication: The block cipher Square