Pages that link to "Item:Q3627440"
From MaRDI portal
The following pages link to Cube Attacks on Tweakable Black Box Polynomials (Q3627440):
Displayed 26 items.
- Conditional differential cryptanalysis of 105 round Grain v1 (Q267806) (← links)
- A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions (Q352050) (← links)
- Optimising Gröbner bases on Bivium (Q626947) (← links)
- Cryptographic properties and application of a generalized unbalanced Feistel network structure (Q662179) (← links)
- Distinguishing properties and applications of higher order derivatives of Boolean functions (Q726339) (← links)
- Optimal parameters for the WG stream cipher family (Q2016392) (← links)
- High order differential attacks on stream ciphers (Q2376658) (← links)
- Applying cube attacks to stream ciphers in realistic scenarios (Q2376659) (← links)
- State cycles, initialization and the Trivium stream cipher (Q2376662) (← links)
- Quark: a lightweight hash (Q2377065) (← links)
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 (Q2434149) (← links)
- Cryptanalysis of Ascon (Q2790053) (← links)
- Another View of the Division Property (Q2835605) (← links)
- Cryptographic Analysis of All 4 × 4-Bit S-Boxes (Q2889866) (← links)
- Conditional Differential Cryptanalysis of Trivium and KATAN (Q2889871) (← links)
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks (Q2946893) (← links)
- A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox (Q2946898) (← links)
- Attacking Bivium and Trivium with the Characteristic Set Method (Q3011904) (← links)
- Breaking Grain-128 with Dynamic Cube Attacks (Q3013083) (← links)
- Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags (Q3084249) (← links)
- Boomerang Distinguisher for the SIMD-512 Compression Function (Q3104738) (← links)
- Numerical solvers and cryptanalysis (Q3400069) (← links)
- Cryptanalysis of Full Sprout (Q3457133) (← links)
- Comparison of Cube Attacks Over Different Vector Spaces (Q3460109) (← links)
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Q3634484) (← links)
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers (Q5504606) (← links)