The block cipher \textsc{Square}
From MaRDI portal
Publication:4639337
DOI10.1007/BFB0052343zbMATH Open1385.94025MaRDI QIDQ4639337FDOQ4639337
Authors: Joan Daemen, Vincent Rijmen, Lars R. Knudsen
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Recommendations
Cites Work
- The cipher SHARK
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- Markov Ciphers and Differential Cryptanalysis
- Attacks on block ciphers of low algebraic degree
- Title not available (Why is that?)
- On the distribution of characteristics in bijective mappings
- Truncated differentials of SAFER
- Title not available (Why is that?)
Cited In (only showing first 100 items - show all)
- Integral cryptanalysis on full MISTY1
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- A geometric approach to linear cryptanalysis
- Multi-objective optimisation of bijective S-boxes
- Finding integral distinguishers with ease
- Strong and tight security guarantees against integral distinguishers
- WARP: revisiting GFN for lightweight 128-bit block cipher
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Security analysis of \textsc{Prince}
- Integral characteristics by keyspace partitioning
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- Impossible differential cryptanalysis using matrix method
- General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher
- Integral cryptanalysis on full MISTY1
- Links among impossible differential, integral and zero correlation linear cryptanalysis
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- A generation algorithm of a sort of \(P\)-permutations
- Lightweight MDS generalized circulant matrices
- A Meet-in-the-Middle Attack on 8-Round AES
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Hamming weight attacks on cryptographic hardware -- breaking masking defense
- New slide attacks on almost self-similar ciphers
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
- Simpira v2: a family of efficient permutations using the AES round function
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Bit-based division property and application to \textsc{Simon} family
- Constructing lightweight optimal diffusion primitives with Feistel structure
- Impossible differential cryptanalysis of advanced encryption standard
- A Unified Approach to Related-Key Attacks
- Known-Key Distinguishers for Some Block Ciphers
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Efficient slide attacks
- The Missing Difference problem, and its applications to counter mode encryption
- Differential and linear cryptanalysis for 2-round spns
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- The cipher SHARK
- Analyzing permutations for AES-like ciphers: understanding shiftrows
- New insights on AES-like SPN ciphers
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Cryptanalysis of Feistel networks with secret round functions
- Modeling for three-subset division property without unknown subset
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
- Lower bounds on the degree of block ciphers
- New criteria for linear maps in AES-like ciphers
- Square, a New Multivariate Encryption Scheme
- On a generalization of substitution-permutation networks: the HADES design strategy
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
- On the (im)possibility of improving the round diffusion of generalized Feistel structures
- CUBE cipher: a family of quasi-involutive block ciphers easy to mask
- Revisiting Gilbert's known-key distinguisher
- Another view of the division property
- The DBlock family of block ciphers
- On Integral Distinguishers of Rijndael Family of Ciphers
- Practical-time attacks against reduced variants of~MISTY1
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Structural cryptanalysis of SASAS
- Extended meet-in-the-middle attacks on some Feistel constructions
- Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
- \(k\)-configurations
- SQUARE attack on block ciphers with low algebraic degree
- Distinguishing properties and applications of higher order derivatives of Boolean functions
- Cube Attacks on Tweakable Black Box Polynomials
- Improving the security and efficiency of block ciphers based on LS-designs
- A new structural-differential property of 5-round AES
- Integral attacks on round-reduced Bel-T-256
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- Statistical integral attack on CAST-256 and IDEA
- 3D: A Three-Dimensional Block Cipher
- Mixture integral attacks on reduced-round AES with a known/secret S-box
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- Cryptanalysis of the full MMB block cipher
- Differential meet-in-the-middle cryptanalysis
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Improved integral cryptanalysis of block ciphers BORON and Khudra
- Square reflection cryptanalysis of 5-round Feistel networks with permutations
- Invariant subspaces in SPN block cipher
- Meet-in-the-middle attacks on AES with value constraints
- Analysis of the CAESAR candidate silver
- Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- Security evaluation of MISTY structure with SPN round function
- Meet-in-the-middle attacks on 10-round AES-256
- Feistel ciphers based on a single primitive
- Quantum speed-up for multidimensional (zero correlation) linear distinguishers
- SPF: a new family of efficient format-preserving encryption algorithms
- Improved truncated differential distinguishers of AES with concrete S-box
- Diffusion rates of linear medium in AES-like ciphers
- Improved Square Attacks against Reduced-Round Hierocrypt
- Square attack on 7-round Kiasu-BC
- A \(2^{70}\) attack on the full MISTY1
- Automatic search for bit-based division property
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
Uses Software
This page was built for publication: The block cipher \textsc{Square}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4639337)