The following pages link to (Q4365755):
Displaying 50 items.
- Capability of evolutionary cryptosystems against differential cryptanalysis (Q350963) (← links)
- Evolutionary cryptography against multidimensional linear cryptanalysis (Q351026) (← links)
- Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function (Q362309) (← links)
- Towards the optimality of Feistel ciphers with substitution-permutation functions (Q398983) (← links)
- Cryptographic properties and application of a generalized unbalanced Feistel network structure (Q662179) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- Improved (related-key) differential cryptanalysis on GIFT (Q832340) (← links)
- Linear cryptanalysis of reduced-round SPECK (Q903200) (← links)
- Variants of the AES key schedule for better truncated differential bounds (Q1726661) (← links)
- Two-round iterative characteristics for linear cryptanalysis of modified DES with embedded parity checks (Q1743313) (← links)
- The resistance of PRESENT-80 against related-key differential attacks (Q2016426) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714) (← links)
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) (Q2102073) (← links)
- Lightweight authenticated encryption mode suitable for threshold implementation (Q2119030) (← links)
- Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis (Q2146092) (← links)
- MILP based differential attack on round reduced WARP (Q2154058) (← links)
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis (Q2170083) (← links)
- Automatic tool for searching for differential characteristics in ARX ciphers and applications (Q2179383) (← links)
- Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode (Q2229266) (← links)
- Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property (Q2333818) (← links)
- Security evaluation of MISTY structure with SPN round function (Q2629406) (← links)
- A bit-vector differential model for the modular addition by a constant (Q2692348) (← links)
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes (Q2807199) (← links)
- Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework (Q2817822) (← links)
- Wide Trail Design Strategy for Binary MixColumns (Q2822689) (← links)
- Improved Top-Down Techniques in Differential Cryptanalysis (Q2946446) (← links)
- Search for Related-Key Differential Characteristics in DES-Like Ciphers (Q3013075) (← links)
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis (Q3084256) (← links)
- Рассеивающие свойства XSLP-шифров (Q3381840) (← links)
- Linear and differential cryptanalysis: Another viewpoint (Q3383111) (← links)
- Toward the True Random Cipher: On Expected Linear Probability Values for SPNS with Randomly Selected S-Boxes (Q3448746) (← links)
- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails (Q3454589) (← links)
- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent (Q3525688) (← links)
- Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent (Q3600320) (← links)
- Best differential characteristic search of FEAL (Q4639325) (← links)
- A family of trapdoor ciphers (Q4639336) (← links)
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck (Q4639483) (← links)
- Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck (Q4639485) (← links)
- Experimental Methods for Constructing MDS Matrices of a Special Form (Q4973255) (← links)
- Двойственность разностного и линейного методов в криптографии (Q5152364) (← links)
- Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes (Q5447511) (← links)
- Trace representations of S-boxes and their application (Q5697861) (← links)
- On the Role of Key Schedules in Attacks on Iterated Ciphers (Q5862314) (← links)
- New method for combining Matsui's bounding conditions with sequential encoding method (Q6063134) (← links)
- Improved differential attacks on GIFT-64 (Q6536224) (← links)
- Distinguisher and related-key attack on HALFLOOP-96 (Q6547843) (← links)
- Designing S-boxes providing stronger security against differential cryptanalysis for ciphers using byte-wise XOR (Q6618588) (← links)
- Parallel SAT framework to find clustering of differential characteristics and its applications (Q6620061) (← links)
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond (Q6636397) (← links)