Pages that link to "Item:Q5311530"
From MaRDI portal
The following pages link to Advances in Cryptology – CRYPTO 2004 (Q5311530):
Displaying 41 items.
- Another look at normal approximations in cryptanalysis (Q293721) (← links)
- Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method (Q329196) (← links)
- Evolutionary cryptography against multidimensional linear cryptanalysis (Q351026) (← links)
- Zero-correlation linear cryptanalysis of reduced-round LBlock (Q398985) (← links)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (Q510482) (← links)
- Multidimensional linear distinguishing attacks and Boolean functions (Q662200) (← links)
- On quadratic approximations in block ciphers (Q734264) (← links)
- Provable security of block ciphers against linear cryptanalysis: a mission impossible? (Q1009123) (← links)
- Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity (Q1667453) (← links)
- Rigorous upper bounds on data complexities of block cipher cryptanalysis (Q1676236) (← links)
- Multidimensional linear cryptanalysis (Q1715851) (← links)
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses (Q1749795) (← links)
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers (Q1934241) (← links)
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} (Q2051403) (← links)
- Improving key-recovery in linear attacks: application to 28-round PRESENT (Q2055609) (← links)
- Revisiting the wrong-key-randomization hypothesis (Q2175215) (← links)
- Correlation attacks on combination generators (Q2376654) (← links)
- Differential-linear cryptanalysis revisited (Q2408590) (← links)
- On probability of success in linear and differential cryptanalysis (Q2482339) (← links)
- Cryptographic Analysis of All 4 × 4-Bit S-Boxes (Q2889866) (← links)
- Differential-Multiple Linear Cryptanalysis (Q3056878) (← links)
- On Linear Hulls and Trails (Q3179489) (← links)
- Многомерный линейный метод и показатели рассеивания линейной среды шифрпреобразований (Q3381893) (← links)
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications (Q3452237) (← links)
- Linear Distinguishing Attack on Shannon (Q3511171) (← links)
- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent (Q3525688) (← links)
- Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent (Q3600320) (← links)
- A Statistical Saturation Attack against the Block Cipher PRESENT (Q3623045) (← links)
- Cryptanalysis of CTC2 (Q3623047) (← links)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450) (← links)
- The Cryptanalysis of Reduced-Round SMS4 (Q3644192) (← links)
- Lombardi Drawings of Knots and Links (Q4625105) (← links)
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques (Q4639492) (← links)
- Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK (Q5095926) (← links)
- Linear Cryptanalysis of Non Binary Ciphers (Q5452257) (← links)
- Критерии проверки гипотезы о наличии зашумленной функциональной зависимости между случайными двоичными векторами и битами (Q5871460) (← links)
- Weak rotational property and its application (Q6074020) (← links)
- A geometric approach to linear cryptanalysis (Q6157485) (← links)
- Improved truncated differential distinguishers of AES with concrete S-box (Q6169479) (← links)
- Optimising linear key recovery attacks with affine Walsh transform pruning (Q6175986) (← links)
- Quantum linear key-recovery attacks using the QFT (Q6190139) (← links)