scientific article; zbMATH DE number 1455102
From MaRDI portal
Publication:4484898
Recommendations
Cited in
(22)- A cryptographic encryption technique byte-spiral rotation encryption algorithm
- The Cryptanalysis of Reduced-Round SMS4
- On related-key attacks and KASUMI: the case of A5/3
- Guaranteeing the diversity of number generators
- Correlation power analysis of lightweight block ciphers: from theory to practice
- Improved differential attacks on RC5
- Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Good Variants of HB + Are Hard to Find
- Construction of bent functions from near-bent functions
- scientific article; zbMATH DE number 177050 (Why is no real title available?)
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Evaluation of chaotic properties of CBC mode of encryption embedded with RC5 block cipher algorithm
- Cryptanalysis of a chaotic stream cipher and its improved scheme
- New Results in Linear Cryptanalysis of RC5
- A MAC mode for lightweight block ciphers
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
- The Multics encipher_Algorithm
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- Quantum algorithm for finding impossible differentials and zero-correlation linear hulls of symmetric ciphers
- On the design and security of RC2
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484898)