scientific article; zbMATH DE number 417582
From MaRDI portal
Publication:3136298
Recommendations
Cited In (only showing first 100 items - show all)
- On the \(c\)-differential spectrum of power functions over finite fields
- Cryptanalysis of Reduced-Round SMS4 Block Cipher
- Differential Cryptanalysis of the ICE Encryption Algorithm
- The Cryptanalysis of Reduced-Round SMS4
- Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
- On related-key attacks and KASUMI: the case of A5/3
- Improved see-in-the-middle attacks on AES
- Image encryption using nonlinear feedback shift register and modified Rc4A algorithm
- A New Attack on the LEX Stream Cipher
- Statistical approximation theory for discrete functions with application in cryptanalysis of iterative block ciphers
- Differential cryptanalysis of KHF
- Improved differential attacks on RC5
- Algebraic Cryptanalysis of Simplified AES∗
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Evaluation and cryptanalysis of the Pandaka lightweight cipher
- Title not available (Why is no real title available?)
- Side channel cryptanalysis of product ciphers
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- Cryptanalysis of SHA-0 and reduced SHA-1
- Differential entropy analysis of the IDEA block cipher
- On the distribution of characteristics in bijective mappings
- A new cipher scheme based on one-way Hash function and IDEA
- Impossible differentials of SPN ciphers
- Improved Differential Cryptanalysis of CAST-128 and CAST-256
- A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
- Differential cryptanalysis of Lucifer
- \(\chi^2\) cryptanalysis of the SEAL encryption algorithm
- Counting active S-boxes is not enough
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- Polytopic cryptanalysis
- Automatic search of meet-in-the-middle and impossible differential attacks
- On construction and (non)existence of \(c\)-(almost) perfect nonlinear functions
- On two DES implementations secure against differential power analysis in smart-cards
- Title not available (Why is no real title available?)
- Properties of permutation representations of nonabelian 2-groups with a cyclic subgroup of index 2
- Randomizing encryption mode
- Cryptanalysis of the stream cipher LEX
- Breaking Littlewood's cipher
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis
- Differential property of \textsc{Present}-like structure
- Dynamic extended DES
- Hill climbing algorithms and Trivium
- Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis
- On the design and security of RC2
- Statistical Analysis of DH1 Cryptosystem
- Quantum statistical mechanics of encryption: reaching the speed limit of classical block ciphers
- Differential Cryptanalysis of Q
- Title not available (Why is no real title available?)
- An STP-based model toward designing S-boxes with good cryptographic properties
- Pseudo-random number generator based on mixing of three chaotic maps
- Partitioning cryptanalysis
- Higher Order Derivatives and Differential Cryptanalysis
- Ambiguity, deficiency and differential spectrum of normalized permutation polynomials over finite fields
- Differential-multiple linear cryptanalysis
- Formalization of the data encryption standard
- Title not available (Why is no real title available?)
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
- Improving linear cryptanalysis of LOKI91 by probabilistic counting method
- Differential Cryptanalysis of Feal and N-Hash
- DES has no per round linear factors
- Title not available (Why is no real title available?)
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Algebraic Cryptanalysis of the Data Encryption Standard
- How to protect DES against exhaustive key search (an analysis of DESX).
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- DES-GENERATED CHECKSUMS FOR ELECTRONIC SIGNATURES
- New slide attacks on almost self-similar ciphers
- Markov Ciphers and Differential Cryptanalysis
- Title not available (Why is no real title available?)
- Title not available (Why is no real title available?)
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- Differential Cryptanalysis of Keccak Variants
- A homophonic DES
- Title not available (Why is no real title available?)
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- New types of cryptanalytic attacks using related keys
- Related-Key Cryptanalysis of Midori
- A Unified Approach to Related-Key Attacks
- Evolutionary computation based cryptanalysis: a first study
- An Improved Impossible Differential Attack on MISTY1
- Title not available (Why is no real title available?)
- Efficient slide attacks
- DES with any reduced masked rounds is not secure against side-channel attacks
- Title not available (Why is no real title available?)
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- Title not available (Why is no real title available?)
- Is the data encryption standard a group? (Results of cycling experiments on DES)
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- New insights on AES-like SPN ciphers
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- Quantum differential cryptanalysis
- Pseudorandom functions: three decades later
- CS-Cipher
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3136298)