The block cipher \textsc{Square}
From MaRDI portal
Publication:4639337
Recommendations
Cites work
- scientific article; zbMATH DE number 4057589 (Why is no real title available?)
- scientific article; zbMATH DE number 3577144 (Why is no real title available?)
- scientific article; zbMATH DE number 1030998 (Why is no real title available?)
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- scientific article; zbMATH DE number 1394295 (Why is no real title available?)
- Attacks on block ciphers of low algebraic degree
- Differential cryptanalysis of DES-like cryptosystems
- Markov Ciphers and Differential Cryptanalysis
- On the distribution of characteristics in bijective mappings
- The cipher SHARK
- Truncated differentials of SAFER
Cited in
(only showing first 100 items - show all)- On some properties of an XSL-network
- Related-key attack on 5-round Kuznyechik
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- Practical-time attacks against reduced variants of~MISTY1
- On Integral Distinguishers of Rijndael Family of Ciphers
- Structural cryptanalysis of SASAS
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Extended meet-in-the-middle attacks on some Feistel constructions
- Integral distinguishers for reduced-round Stribog
- \(k\)-configurations
- Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
- SQUARE attack on block ciphers with low algebraic degree
- New representations of the AES key schedule
- Distinguishing properties and applications of higher order derivatives of Boolean functions
- Improved division property for ciphers with complex linear layers
- Truncated differential properties of the diagonal set of inputs for 5-round AES
- Improving the security and efficiency of block ciphers based on LS-designs
- Divide and rule: \textsf{DiFA} -- division property based fault attacks on \textsf{PRESENT} and \textsf{GIFT}
- Cube Attacks on Tweakable Black Box Polynomials
- Integral attacks on round-reduced Bel-T-256
- Ghidle: efficient large-state block ciphers for post-quantum security
- Related-cipher attacks: applications to Ballet and ANT
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging
- Polye+CTR: a swiss-army-knife mode for block ciphers
- A new structural-differential property of 5-round AES
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications
- Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher
- Statistical integral attack on CAST-256 and IDEA
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- Mixture integral attacks on reduced-round AES with a known/secret S-box
- Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- 3D: A Three-Dimensional Block Cipher
- Integral cryptanalysis on full MISTY1
- Quantum impossible differential attacks: applications to AES and SKINNY
- Multi-objective optimisation of bijective S-boxes
- A geometric approach to linear cryptanalysis
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
- Finding integral distinguishers with ease
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Cryptanalysis of the full MMB block cipher
- Strong and tight security guarantees against integral distinguishers
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Differential meet-in-the-middle cryptanalysis
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Square reflection cryptanalysis of 5-round Feistel networks with permutations
- Security analysis of \textsc{Prince}
- Impossible differential cryptanalysis using matrix method
- Integral characteristics by keyspace partitioning
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- Improved integral cryptanalysis of block ciphers BORON and Khudra
- General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher
- Integral cryptanalysis on full MISTY1
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- A generation algorithm of a sort of \(P\)-permutations
- Links among impossible differential, integral and zero correlation linear cryptanalysis
- Lightweight MDS generalized circulant matrices
- Invariant subspaces in SPN block cipher
- A Meet-in-the-Middle Attack on 8-Round AES
- Analysis of the CAESAR candidate silver
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- New slide attacks on almost self-similar ciphers
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
- Hamming weight attacks on cryptographic hardware -- breaking masking defense
- Meet-in-the-middle attacks on AES with value constraints
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- Security evaluation of MISTY structure with SPN round function
- Meet-in-the-middle attacks on 10-round AES-256
- Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers
- Simpira v2: a family of efficient permutations using the AES round function
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Constructing lightweight optimal diffusion primitives with Feistel structure
- Bit-based division property and application to \textsc{Simon} family
- Feistel ciphers based on a single primitive
- Quantum speed-up for multidimensional (zero correlation) linear distinguishers
- SPF: a new family of efficient format-preserving encryption algorithms
- Improved truncated differential distinguishers of AES with concrete S-box
- Impossible differential cryptanalysis of advanced encryption standard
- Diffusion rates of linear medium in AES-like ciphers
- A Unified Approach to Related-Key Attacks
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Known-Key Distinguishers for Some Block Ciphers
- Improved Square Attacks against Reduced-Round Hierocrypt
- Square attack on 7-round Kiasu-BC
- A \(2^{70}\) attack on the full MISTY1
- The Missing Difference problem, and its applications to counter mode encryption
- Differential and linear cryptanalysis for 2-round spns
- Efficient slide attacks
- Automatic search for bit-based division property
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- A Five-Round Algebraic Property of the Advanced Encryption Standard
- Analyzing permutations for AES-like ciphers: understanding shiftrows
- The cipher SHARK
- New insights on AES-like SPN ciphers
- More accurate division property propagations based on optimized implementations of linear layers
This page was built for publication: The block cipher \textsc{Square}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4639337)