scientific article; zbMATH DE number 417582
From MaRDI portal
Publication:3136298
Recommendations
Cited in
(only showing first 100 items - show all)- Quantum statistical mechanics of encryption: reaching the speed limit of classical block ciphers
- A new cipher scheme based on one-way Hash function and IDEA
- Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
- On related-key attacks and KASUMI: the case of A5/3
- scientific article; zbMATH DE number 2216934 (Why is no real title available?)
- Improved differential attacks on RC5
- Differential entropy analysis of the IDEA block cipher
- On the \(c\)-differential spectrum of power functions over finite fields
- A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
- Differential Cryptanalysis of Q
- Cryptanalysis of Reduced-Round SMS4 Block Cipher
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis
- Improved Differential Cryptanalysis of CAST-128 and CAST-256
- On construction and (non)existence of \(c\)-(almost) perfect nonlinear functions
- On two DES implementations secure against differential power analysis in smart-cards
- Hill climbing algorithms and Trivium
- Image encryption using nonlinear feedback shift register and modified Rc4A algorithm
- A New Attack on the LEX Stream Cipher
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Statistical approximation theory for discrete functions with application in cryptanalysis of iterative block ciphers
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- Counting active S-boxes is not enough
- Cryptanalysis of the stream cipher LEX
- scientific article; zbMATH DE number 1688998 (Why is no real title available?)
- Properties of permutation representations of nonabelian 2-groups with a cyclic subgroup of index 2
- Differential cryptanalysis of KHF
- Statistical Analysis of DH1 Cryptosystem
- Differential Cryptanalysis of the ICE Encryption Algorithm
- Side channel cryptanalysis of product ciphers
- Differential cryptanalysis of Lucifer
- Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis
- Differential property of \textsc{Present}-like structure
- On the distribution of characteristics in bijective mappings
- Dynamic extended DES
- Randomizing encryption mode
- Algebraic Cryptanalysis of Simplified AES∗
- Impossible differentials of SPN ciphers
- Improved see-in-the-middle attacks on AES
- Cryptanalysis of SHA-0 and reduced SHA-1
- Polytopic cryptanalysis
- On the design and security of RC2
- Automatic search of meet-in-the-middle and impossible differential attacks
- Breaking Littlewood's cipher
- The Cryptanalysis of Reduced-Round SMS4
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- Evaluation and cryptanalysis of the Pandaka lightweight cipher
- \(\chi^2\) cryptanalysis of the SEAL encryption algorithm
- Efficient chaotic encryption scheme with OFB mode
- The \(c\)-boomerang uniformity of two classes of permutation polynomials over finite fields
- Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications
- The design of the ICE encryption algorithm
- A differential cryptanalysis of tree-structured substitution-permutation networks
- New approaches for estimating the bias of differential-linear distinguishers
- scientific article; zbMATH DE number 721905 (Why is no real title available?)
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails
- Advancing the meet-in-the-filter technique: applications to CHAM and KATAN
- Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
- See-in-the-middle attacks on blockciphers ARIA and DEFAULT
- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
- Related-cipher attacks: applications to Ballet and ANT
- Related-key differential cryptanalysis of full round \texttt{CRAFT}
- Rectangle attacks on reduced versions of the FBC block cipher
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher
- Variant of DES-128, 192, 256
- Generalized Feistel ciphers for efficient prime field masking
- A Five-Round Algebraic Property of the Advanced Encryption Standard
- An attack on the GOST 28147-89 block cipher with 12 related keys
- On design and analysis of a new block cipher
- Distributed differential criptanalysis of FEAL-8
- Impossible differential cryptanalysis of the raindrop block cipher
- Investigating rational perfect nonlinear functions
- scientific article; zbMATH DE number 3972781 (Why is no real title available?)
- New insights on impossible differential cryptanalysis
- scientific article; zbMATH DE number 697798 (Why is no real title available?)
- Differential-multiple linear cryptanalysis
- Slidex attacks on the Even-Mansour encryption scheme
- Reflection Cryptanalysis of Some Ciphers
- New Impossible Differential Attacks on AES
- On \((-1)\)-differential uniformity of ternary APN power functions
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- scientific article; zbMATH DE number 708833 (Why is no real title available?)
- Logistic map as a block encryption algorithm
- scientific article; zbMATH DE number 708826 (Why is no real title available?)
- A Unified Approach to Related-Key Attacks
- The DBlock family of block ciphers
- DES has no per round linear factors
- Improving the strict avalanche characteristics of cryptographic functions
- scientific article; zbMATH DE number 1406761 (Why is no real title available?)
- scientific article; zbMATH DE number 708827 (Why is no real title available?)
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- New insights on AES-like SPN ciphers
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- DES-GENERATED CHECKSUMS FOR ELECTRONIC SIGNATURES
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3136298)