The following pages link to The block cipher Square (Q4639337):
Displayed 50 items.
- Practical-time attacks against reduced variants of~MISTY1 (Q494594) (← links)
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- Structural cryptanalysis of SASAS (Q604629) (← links)
- Statistical integral attack on CAST-256 and IDEA (Q680942) (← links)
- Distinguishing properties and applications of higher order derivatives of Boolean functions (Q726339) (← links)
- Revisiting Gilbert's known-key distinguisher (Q780379) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications (Q892302) (← links)
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes (Q893871) (← links)
- Impossible differential cryptanalysis using matrix method (Q966035) (← links)
- Differential and linear cryptanalysis for 2-round spns (Q1014440) (← links)
- New criteria for linear maps in AES-like ciphers (Q1032487) (← links)
- The Missing Difference problem, and its applications to counter mode encryption (Q1648860) (← links)
- Integral attacks on round-reduced Bel-T-256 (Q1726664) (← links)
- Finding integral distinguishers with ease (Q1726670) (← links)
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers (Q1749792) (← links)
- Modeling for three-subset division property without unknown subset (Q2044753) (← links)
- New slide attacks on almost self-similar ciphers (Q2055611) (← links)
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD (Q2055620) (← links)
- On the (im)possibility of improving the round diffusion of generalized Feistel structures (Q2059884) (← links)
- Integral characteristics by keyspace partitioning (Q2115730) (← links)
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES (Q2118720) (← links)
- On a generalization of substitution-permutation networks: the HADES design strategy (Q2119029) (← links)
- \(k\)-configurations (Q2135135) (← links)
- Automatic search for bit-based division property (Q2146095) (← links)
- More accurate division property propagations based on optimized implementations of linear layers (Q2151301) (← links)
- Mixture integral attacks on reduced-round AES with a known/secret S-box (Q2152036) (← links)
- Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 (Q2152163) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Survey on recent trends towards generalized differential and boomerang uniformities (Q2154879) (← links)
- Impossible differential cryptanalysis of advanced encryption standard (Q2385406) (← links)
- Integral cryptanalysis on full MISTY1 (Q2408592) (← links)
- Efficient slide attacks (Q2413611) (← links)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher (Q2437779) (← links)
- Square reflection cryptanalysis of 5-round Feistel networks with permutations (Q2445261) (← links)
- Integral distinguishers for reduced-round Stribog (Q2448116) (← links)
- Multi-objective optimisation of bijective S-boxes (Q2493290) (← links)
- On some probabilistic approximations for AES-like S-boxes (Q2501584) (← links)
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography (Q2628123) (← links)
- Security evaluation of MISTY structure with SPN round function (Q2629406) (← links)
- Meet-in-the-middle attacks on 10-round AES-256 (Q2630710) (← links)
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- Improved key-recovery attacks on reduced-round WEM-8 (Q2673988) (← links)
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums (Q2692351) (← links)
- Lower bounds on the degree of block ciphers (Q2692355) (← links)
- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows (Q2790029) (← links)
- Cryptanalysis of Feistel Networks with Secret Round Functions (Q2807198) (← links)
- Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure (Q2807222) (← links)
- Analysis of the CAESAR Candidate Silver (Q2807229) (← links)