scientific article; zbMATH DE number 417582
From MaRDI portal
Publication:3136298
Recommendations
Cited in
(only showing first 100 items - show all)- Quantum statistical mechanics of encryption: reaching the speed limit of classical block ciphers
- A new cipher scheme based on one-way Hash function and IDEA
- Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
- On related-key attacks and KASUMI: the case of A5/3
- scientific article; zbMATH DE number 2216934 (Why is no real title available?)
- Improved differential attacks on RC5
- Differential entropy analysis of the IDEA block cipher
- On the \(c\)-differential spectrum of power functions over finite fields
- A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
- Differential Cryptanalysis of Q
- Cryptanalysis of Reduced-Round SMS4 Block Cipher
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis
- Improved Differential Cryptanalysis of CAST-128 and CAST-256
- On construction and (non)existence of \(c\)-(almost) perfect nonlinear functions
- On two DES implementations secure against differential power analysis in smart-cards
- Hill climbing algorithms and Trivium
- Image encryption using nonlinear feedback shift register and modified Rc4A algorithm
- A New Attack on the LEX Stream Cipher
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Statistical approximation theory for discrete functions with application in cryptanalysis of iterative block ciphers
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- Counting active S-boxes is not enough
- Cryptanalysis of the stream cipher LEX
- scientific article; zbMATH DE number 1688998 (Why is no real title available?)
- Properties of permutation representations of nonabelian 2-groups with a cyclic subgroup of index 2
- Differential cryptanalysis of KHF
- Statistical Analysis of DH1 Cryptosystem
- Differential Cryptanalysis of the ICE Encryption Algorithm
- Side channel cryptanalysis of product ciphers
- Differential cryptanalysis of Lucifer
- Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis
- Differential property of \textsc{Present}-like structure
- On the distribution of characteristics in bijective mappings
- Dynamic extended DES
- Randomizing encryption mode
- Algebraic Cryptanalysis of Simplified AES∗
- Impossible differentials of SPN ciphers
- Improved see-in-the-middle attacks on AES
- Cryptanalysis of SHA-0 and reduced SHA-1
- Polytopic cryptanalysis
- On the design and security of RC2
- Automatic search of meet-in-the-middle and impossible differential attacks
- Breaking Littlewood's cipher
- The Cryptanalysis of Reduced-Round SMS4
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- Evaluation and cryptanalysis of the Pandaka lightweight cipher
- \(\chi^2\) cryptanalysis of the SEAL encryption algorithm
- New insights on impossible differential cryptanalysis
- scientific article; zbMATH DE number 697798 (Why is no real title available?)
- Differential-multiple linear cryptanalysis
- Slidex attacks on the Even-Mansour encryption scheme
- Reflection Cryptanalysis of Some Ciphers
- New Impossible Differential Attacks on AES
- On \((-1)\)-differential uniformity of ternary APN power functions
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- scientific article; zbMATH DE number 708833 (Why is no real title available?)
- Logistic map as a block encryption algorithm
- scientific article; zbMATH DE number 708826 (Why is no real title available?)
- A Unified Approach to Related-Key Attacks
- The DBlock family of block ciphers
- DES has no per round linear factors
- Improving the strict avalanche characteristics of cryptographic functions
- scientific article; zbMATH DE number 1406761 (Why is no real title available?)
- scientific article; zbMATH DE number 708827 (Why is no real title available?)
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- New insights on AES-like SPN ciphers
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- DES-GENERATED CHECKSUMS FOR ELECTRONIC SIGNATURES
- Serpent: a new block cipher proposal
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
- An STP-based model toward designing S-boxes with good cryptographic properties
- scientific article; zbMATH DE number 1406763 (Why is no real title available?)
- Practical attack on the full MMB block cipher
- scientific article; zbMATH DE number 3952651 (Why is no real title available?)
- A new structural-differential property of 5-round AES
- LBlock: a lightweight block cipher
- On immunity against Biham and Shamir's differential cryptanalysis
- SQUARE attack on block ciphers with low algebraic degree
- Capability of evolutionary cryptosystems against differential cryptanalysis
- A family of trapdoor ciphers
- Evolutionary computation based cryptanalysis: a first study
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- Improving linear cryptanalysis of LOKI91 by probabilistic counting method
- Differential Cryptanalysis of Feal and N-Hash
- On probability of success in linear and differential cryptanalysis
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Pseudo-random number generator based on mixing of three chaotic maps
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- Efficient slide attacks
- Partitioning cryptanalysis
- DES with any reduced masked rounds is not secure against side-channel attacks
- New types of cryptanalytic attacks using related keys
- New slide attacks on almost self-similar ciphers
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3136298)