The block cipher \textsc{Square}
From MaRDI portal
Publication:4639337
DOI10.1007/BFB0052343zbMATH Open1385.94025MaRDI QIDQ4639337FDOQ4639337
Authors: Joan Daemen, Vincent Rijmen, Lars R. Knudsen
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Recommendations
Cites Work
- The cipher SHARK
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- Markov Ciphers and Differential Cryptanalysis
- Attacks on block ciphers of low algebraic degree
- Title not available (Why is that?)
- On the distribution of characteristics in bijective mappings
- Truncated differentials of SAFER
- Title not available (Why is that?)
Cited In (only showing first 100 items - show all)
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- Cryptanalysis of the full MMB block cipher
- Differential meet-in-the-middle cryptanalysis
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Improved integral cryptanalysis of block ciphers BORON and Khudra
- Square reflection cryptanalysis of 5-round Feistel networks with permutations
- Invariant subspaces in SPN block cipher
- Meet-in-the-middle attacks on AES with value constraints
- Analysis of the CAESAR candidate silver
- Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- Security evaluation of MISTY structure with SPN round function
- Meet-in-the-middle attacks on 10-round AES-256
- Feistel ciphers based on a single primitive
- Quantum speed-up for multidimensional (zero correlation) linear distinguishers
- SPF: a new family of efficient format-preserving encryption algorithms
- Improved truncated differential distinguishers of AES with concrete S-box
- Diffusion rates of linear medium in AES-like ciphers
- Improved Square Attacks against Reduced-Round Hierocrypt
- Square attack on 7-round Kiasu-BC
- A \(2^{70}\) attack on the full MISTY1
- Automatic search for bit-based division property
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- A Five-Round Algebraic Property of the Advanced Encryption Standard
- More accurate division property propagations based on optimized implementations of linear layers
- Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Survey on recent trends towards generalized differential and boomerang uniformities
- Probabilistic related-key statistical saturation cryptanalysis
- New Applications of Differential Bounds of the SDS Structure
- Massive superpoly recovery with nested monomial predictions
- Wide Trail Design Strategy for Binary MixColumns
- Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
- Truncated boomerang attacks and application to AES-based ciphers
- Partial sums meet FFT: improved attack on 6-round AES
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- Improved key-recovery attacks on reduced-round WEM-8
- Integral Cryptanalysis of Reduced-Round Tweakable TWINE
- On some probabilistic approximations for AES-like S-boxes
- On some properties of an XSL-network
- Related-key attack on 5-round Kuznyechik
- Integral distinguishers for reduced-round Stribog
- New representations of the AES key schedule
- Improved division property for ciphers with complex linear layers
- Truncated differential properties of the diagonal set of inputs for 5-round AES
- Divide and rule: \textsf{DiFA} -- division property based fault attacks on \textsf{PRESENT} and \textsf{GIFT}
- Ghidle: efficient large-state block ciphers for post-quantum security
- Related-cipher attacks: applications to Ballet and ANT
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging
- Polye+CTR: a swiss-army-knife mode for block ciphers
- Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher
- Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
- Quantum impossible differential attacks: applications to AES and SKINNY
- Integral cryptanalysis on full MISTY1
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- A geometric approach to linear cryptanalysis
- Multi-objective optimisation of bijective S-boxes
- Finding integral distinguishers with ease
- Strong and tight security guarantees against integral distinguishers
- WARP: revisiting GFN for lightweight 128-bit block cipher
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Security analysis of \textsc{Prince}
- Integral characteristics by keyspace partitioning
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- Impossible differential cryptanalysis using matrix method
- General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher
- Integral cryptanalysis on full MISTY1
- Links among impossible differential, integral and zero correlation linear cryptanalysis
- Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
- A generation algorithm of a sort of \(P\)-permutations
- Lightweight MDS generalized circulant matrices
- A Meet-in-the-Middle Attack on 8-Round AES
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Hamming weight attacks on cryptographic hardware -- breaking masking defense
- New slide attacks on almost self-similar ciphers
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
- Simpira v2: a family of efficient permutations using the AES round function
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Bit-based division property and application to \textsc{Simon} family
- Constructing lightweight optimal diffusion primitives with Feistel structure
- Impossible differential cryptanalysis of advanced encryption standard
- A Unified Approach to Related-Key Attacks
- Known-Key Distinguishers for Some Block Ciphers
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Efficient slide attacks
- The Missing Difference problem, and its applications to counter mode encryption
- Differential and linear cryptanalysis for 2-round spns
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- The cipher SHARK
- Analyzing permutations for AES-like ciphers: understanding shiftrows
- New insights on AES-like SPN ciphers
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Cryptanalysis of Feistel networks with secret round functions
- Modeling for three-subset division property without unknown subset
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
Uses Software
This page was built for publication: The block cipher \textsc{Square}
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4639337)