scientific article; zbMATH DE number 5009213
From MaRDI portal
Publication:3374925
zbMATH Open1082.94505MaRDI QIDQ3374925FDOQ3374925
Authors: Eli Biham
Publication date: 1 March 2006
Title of this publication is not available (Why is that?)
Recommendations
- Publication:4941862
- Cryptanalysis of 2R− Schemes
- Cryptanalysis of two combinatorial public key cryptosystems
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- scientific article; zbMATH DE number 1618046
- Cryptanalysis of 2 round \textsc{Keccak}-384
- Security in Communication Networks
- Cryptanalysis of Rijndael S-box and improvement
- A Cryptanalysis of the Double-Round Quadratic Cryptosystem
- Key-dependent S-boxes and differential cryptanalysis
Cited In (8)
- Cryptanalysis of C2
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers
- Key Recovery on Hidden Monomial Multivariate Schemes
- Structural cryptanalysis of SASAS
- Multiset structural attack on generalized Feistel networks
- An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography
- Key-recovery attacks on \(\mathsf{ASASA}\)
- Literature survey on nonlinear components and chaotic nonlinear components of block ciphers
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3374925)