The block cipher Square

From MaRDI portal
Publication:4639337

DOI10.1007/BFb0052343zbMath1385.94025MaRDI QIDQ4639337

Joan Daemen, Vincent Rijmen, Lars R. Knudsen

Publication date: 9 May 2018

Published in: Fast Software Encryption (Search for Journal in Brave)




Related Items (only showing first 100 items - show all)

Truncated boomerang attacks and application to AES-based ciphersFinding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacksTruncated differential properties of the diagonal set of inputs for 5-round AESImproved division property for ciphers with complex linear layersLight but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphersExploring the optimality of byte-wise permutations of a piccolo-type block CipherQuantum impossible differential attacks: applications to AES and SKINNYDifferential meet-in-the-middle cryptanalysisA geometric approach to linear cryptanalysisStrong and tight security guarantees against integral distinguishersMassive superpoly recovery with nested monomial predictionsImproved truncated differential distinguishers of AES with concrete S-boxA new method for impossible differential cryptanalysis of 8-round advanced encryption standardWARP: revisiting GFN for lightweight 128-bit block cipherSQUARE attack on block ciphers with low algebraic degree\(k\)-configurationsApplications of design theory for the constructions of MDS matrices for lightweight cryptographySecurity evaluation of MISTY structure with SPN round functionMeet-in-the-middle attacks on 10-round AES-256Extended meet-in-the-middle attacks on some Feistel constructionsSEA: A Scalable Encryption Algorithm for Small Embedded ApplicationseSPF: A Family of Format-Preserving Encryption Algorithms Using MDS MatricesMeet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple PlatformsRecursive Diffusion Layers for (Lightweight) Block Ciphers and Hash FunctionsLinks Among Impossible Differential, Integral and Zero Correlation Linear CryptanalysisIntegral Cryptanalysis on Full MISTY1Automatic search for bit-based division propertyImpossible differential cryptanalysis of advanced encryption standardMore accurate division property propagations based on optimized implementations of linear layersMixture integral attacks on reduced-round AES with a known/secret S-boxIntegral attacks on Pyjamask-96 and round-reduced Pyjamask-128Pholkos -- efficient large-state tweakable block ciphers from the AES round functionThe Missing Difference problem, and its applications to counter mode encryptionSurvey on recent trends towards generalized differential and boomerang uniformitiesGeneral Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block CipherStructural cryptanalysis of SASASIntegral cryptanalysis on full MISTY1Efficient slide attacksCryptanalysis of the Full 8.5-Round REESSE3+ Block CipherMeet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3Security Analysis of PRINCECUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskImproved key-recovery attacks on reduced-round WEM-8Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applicationsKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionApplying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block CiphersAn algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sumsLower bounds on the degree of block ciphersThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherA Unified Approach to Related-Key AttacksA Meet-in-the-Middle Attack on 8-Round AESSPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsSquare reflection cryptanalysis of 5-round Feistel networks with permutationsIntegral distinguishers for reduced-round StribogA Five-Round Algebraic Property of the Advanced Encryption StandardNew Applications of Differential Bounds of the SDS StructureKnown-Key Distinguishers for Some Block CiphersIntegral attacks on round-reduced Bel-T-256Finding integral distinguishers with easePractical-time attacks against reduced variants of~MISTY1Lightweight MDS Generalized Circulant MatricesBit-Based Division Property and Application to Simon FamilyIntegrals Go Statistical: Cryptanalysis of Full Skipjack VariantsОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESImproving the security and efficiency of block ciphers based on LS-designsStatistical integral attack on CAST-256 and IDEAStatistical integral distinguisher with multi-structure and its application on AES-like ciphersGeneration algorithm of a sort of P-permutationsOn Integral Distinguishers of Rijndael Family of CiphersUnnamed ItemImpossible differential cryptanalysis using matrix methodA New Structural-Differential Property of 5-Round AESThe (related-key) impossible boomerang attack and its application to the AES block cipherMulti-objective optimisation of bijective S-boxesOn some probabilistic approximations for AES-like S-boxesAnalyzing Permutations for AES-like Ciphers: Understanding ShiftRowsDistinguishing properties and applications of higher order derivatives of Boolean functionsImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesCryptanalysis of Feistel Networks with Secret Round FunctionsConstructing Lightweight Optimal Diffusion Primitives with Feistel StructureAnalysis of the CAESAR Candidate SilverA Statistical Saturation Attack against the Block Cipher PRESENTModeling for three-subset division property without unknown subsetCube Attacks on Tweakable Black Box PolynomialsПоказатели рассеивания линейной среды AES-подобных алгоритмов шифрованияDifferential and linear cryptanalysis for 2-round spnsOn some properties of an XSL-networkRelated-key attack on 5-round KuznyechikZero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256New slide attacks on almost self-similar ciphersModeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEADCryptographic Properties and Application of a Generalized Unbalanced Feistel Network StructureDistinguishers for Ciphers and Known Key Attack against Rijndael with Large BlocksWide Trail Design Strategy for Binary MixColumnsSquare Attack on 7-Round Kiasu-BCPolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersOn the (im)possibility of improving the round diffusion of generalized Feistel structuresThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS


Uses Software


Cites Work


This page was built for publication: The block cipher Square