A framework for automated independent-biclique cryptanalysis
From MaRDI portal
Publication:2946897
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- Biclique Cryptanalysis of the Full AES
- Biclique attack on the full \texttt{HIGHT}
- Biclique cryptanalysis of reduced-round Piccolo block cipher
- Bicliques for preimages: attacks on Skein-512 and the SHA-2 family
- Differential Propagation Analysis of Keccak
- Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
- Multidimensional meet-in-the-middle attacks on reduced-round TWINE-128
- Narrow-bicliques: cryptanalysis of full IDEA
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Preimage Attacks on Step-Reduced MD5
Cited in
(4)
This page was built for publication: A framework for automated independent-biclique cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946897)