scientific article; zbMATH DE number 417582
From MaRDI portal
Publication:3136298
Recommendations
Cited in
(only showing first 100 items - show all)- New insights on impossible differential cryptanalysis
- scientific article; zbMATH DE number 697798 (Why is no real title available?)
- Differential-multiple linear cryptanalysis
- Slidex attacks on the Even-Mansour encryption scheme
- Reflection Cryptanalysis of Some Ciphers
- New Impossible Differential Attacks on AES
- On \((-1)\)-differential uniformity of ternary APN power functions
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- scientific article; zbMATH DE number 708833 (Why is no real title available?)
- Logistic map as a block encryption algorithm
- scientific article; zbMATH DE number 708826 (Why is no real title available?)
- A Unified Approach to Related-Key Attacks
- The DBlock family of block ciphers
- DES has no per round linear factors
- Improving the strict avalanche characteristics of cryptographic functions
- scientific article; zbMATH DE number 1406761 (Why is no real title available?)
- scientific article; zbMATH DE number 708827 (Why is no real title available?)
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- New insights on AES-like SPN ciphers
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- DES-GENERATED CHECKSUMS FOR ELECTRONIC SIGNATURES
- Serpent: a new block cipher proposal
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
- An STP-based model toward designing S-boxes with good cryptographic properties
- scientific article; zbMATH DE number 1406763 (Why is no real title available?)
- Practical attack on the full MMB block cipher
- scientific article; zbMATH DE number 3952651 (Why is no real title available?)
- A new structural-differential property of 5-round AES
- LBlock: a lightweight block cipher
- On immunity against Biham and Shamir's differential cryptanalysis
- SQUARE attack on block ciphers with low algebraic degree
- Capability of evolutionary cryptosystems against differential cryptanalysis
- A family of trapdoor ciphers
- Evolutionary computation based cryptanalysis: a first study
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- Differential cryptanalysis of KHF
- Improving linear cryptanalysis of LOKI91 by probabilistic counting method
- Differential Cryptanalysis of Feal and N-Hash
- On probability of success in linear and differential cryptanalysis
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Pseudo-random number generator based on mixing of three chaotic maps
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- Efficient slide attacks
- Partitioning cryptanalysis
- DES with any reduced masked rounds is not secure against side-channel attacks
- New types of cryptanalytic attacks using related keys
- New slide attacks on almost self-similar ciphers
- An Improved Impossible Differential Attack on MISTY1
- An improvement of Davies' attack on DES
- Algebraic Cryptanalysis of the Data Encryption Standard
- Differential attack on five rounds of the SC2000 block cipher
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- Best differential characteristic search of FEAL
- Higher Order Derivatives and Differential Cryptanalysis
- Formalization of the data encryption standard
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- scientific article; zbMATH DE number 1676630 (Why is no real title available?)
- Pseudorandom functions: three decades later
- Related-Key Cryptanalysis of Midori
- How to protect DES against exhaustive key search (an analysis of DESX).
- A Differential-Linear Attack on 12-Round Serpent
- Analysis of Grain’s Initialization Algorithm
- CS-Cipher
- Markov Ciphers and Differential Cryptanalysis
- Format-preserving encryption algorithms using families of tweakable blockciphers
- Ambiguity, deficiency and differential spectrum of normalized permutation polynomials over finite fields
- Pseudo-random bit generator based on multi-modal maps
- Quantum differential cryptanalysis
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- The interpolation attack on block ciphers
- scientific article; zbMATH DE number 1394296 (Why is no real title available?)
- Differential Cryptanalysis of Keccak Variants
- A homophonic DES
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- scientific article; zbMATH DE number 1406793 (Why is no real title available?)
- Is the data encryption standard a group? (Results of cycling experiments on DES)
- scientific article; zbMATH DE number 3793924 (Why is no real title available?)
- Quantum differential and linear cryptanalysis
- Quantum statistical mechanics of encryption: reaching the speed limit of classical block ciphers
- A new cipher scheme based on one-way Hash function and IDEA
- Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
- On related-key attacks and KASUMI: the case of A5/3
- scientific article; zbMATH DE number 2216934 (Why is no real title available?)
- Improved differential attacks on RC5
- Differential entropy analysis of the IDEA block cipher
- On the \(c\)-differential spectrum of power functions over finite fields
- A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
- Differential Cryptanalysis of Q
- Cryptanalysis of Reduced-Round SMS4 Block Cipher
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis
- Improved Differential Cryptanalysis of CAST-128 and CAST-256
- On construction and (non)existence of \(c\)-(almost) perfect nonlinear functions
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3136298)