Pages that link to "Item:Q2948331"
From MaRDI portal
The following pages link to A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro (Q2948331):
Displaying 24 items.
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- A new non-random property of 4.5-round PRINCE (Q831652) (← links)
- Weak-key distinguishers for AES (Q832335) (← links)
- New observations on invariant subspace attack (Q1653027) (← links)
- Differential-linear and related key cryptanalysis of round-reduced scream (Q1751405) (← links)
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 (Q2010591) (← links)
- Cryptanalysis of \texttt{NORX} v2.0 (Q2010594) (← links)
- Cryptographic properties of cyclic binary matrices (Q2025370) (← links)
- On invariant subspaces in the Lai-Massey scheme and a primitivity reduction (Q2050141) (← links)
- New representations of the AES key schedule (Q2056670) (← links)
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette} (Q2056713) (← links)
- More accurate results on the provable security of AES against impossible differential cryptanalysis (Q2334448) (← links)
- Rotational differential-linear cryptanalysis revisited (Q2677646) (← links)
- Nonlinear Invariant Attack (Q2953771) (← links)
- Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE (Q3179493) (← links)
- Влияние приводимости линейного преобразования на выбор раундовых констант (Q3381878) (← links)
- The permutation group insight on the diffusion property of linear mappings (Q3382018) (← links)
- Характеризация отображений через свойство неизометричности (Q3383095) (← links)
- On the primitivity of the AES-128 key-schedule (Q6090967) (← links)
- On the image of an affine subspace under the inverse function within a finite field (Q6123059) (← links)
- Generalized Feistel ciphers for efficient prime field masking (Q6637329) (← links)
- New representations of the AES key schedule (Q6639505) (← links)