The block cipher Square
From MaRDI portal
Publication:4639337
DOI10.1007/BFb0052343zbMath1385.94025MaRDI QIDQ4639337
Joan Daemen, Vincent Rijmen, Lars R. Knudsen
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Related Items (only showing first 100 items - show all)
Truncated boomerang attacks and application to AES-based ciphers ⋮ Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks ⋮ Truncated differential properties of the diagonal set of inputs for 5-round AES ⋮ Improved division property for ciphers with complex linear layers ⋮ Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers ⋮ Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher ⋮ Quantum impossible differential attacks: applications to AES and SKINNY ⋮ Differential meet-in-the-middle cryptanalysis ⋮ A geometric approach to linear cryptanalysis ⋮ Strong and tight security guarantees against integral distinguishers ⋮ Massive superpoly recovery with nested monomial predictions ⋮ Improved truncated differential distinguishers of AES with concrete S-box ⋮ A new method for impossible differential cryptanalysis of 8-round advanced encryption standard ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ SQUARE attack on block ciphers with low algebraic degree ⋮ \(k\)-configurations ⋮ Applications of design theory for the constructions of MDS matrices for lightweight cryptography ⋮ Security evaluation of MISTY structure with SPN round function ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers ⋮ $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms ⋮ Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions ⋮ Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis ⋮ Integral Cryptanalysis on Full MISTY1 ⋮ Automatic search for bit-based division property ⋮ Impossible differential cryptanalysis of advanced encryption standard ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Mixture integral attacks on reduced-round AES with a known/secret S-box ⋮ Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ The Missing Difference problem, and its applications to counter mode encryption ⋮ Survey on recent trends towards generalized differential and boomerang uniformities ⋮ General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher ⋮ Structural cryptanalysis of SASAS ⋮ Integral cryptanalysis on full MISTY1 ⋮ Efficient slide attacks ⋮ Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher ⋮ Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 ⋮ Security Analysis of PRINCE ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ Improved key-recovery attacks on reduced-round WEM-8 ⋮ Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ Lower bounds on the degree of block ciphers ⋮ The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ A Unified Approach to Related-Key Attacks ⋮ A Meet-in-the-Middle Attack on 8-Round AES ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ Square reflection cryptanalysis of 5-round Feistel networks with permutations ⋮ Integral distinguishers for reduced-round Stribog ⋮ A Five-Round Algebraic Property of the Advanced Encryption Standard ⋮ New Applications of Differential Bounds of the SDS Structure ⋮ Known-Key Distinguishers for Some Block Ciphers ⋮ Integral attacks on round-reduced Bel-T-256 ⋮ Finding integral distinguishers with ease ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ Lightweight MDS Generalized Circulant Matrices ⋮ Bit-Based Division Property and Application to Simon Family ⋮ Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Statistical integral attack on CAST-256 and IDEA ⋮ Statistical integral distinguisher with multi-structure and its application on AES-like ciphers ⋮ Generation algorithm of a sort of P-permutations ⋮ On Integral Distinguishers of Rijndael Family of Ciphers ⋮ Unnamed Item ⋮ Impossible differential cryptanalysis using matrix method ⋮ A New Structural-Differential Property of 5-Round AES ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Multi-objective optimisation of bijective S-boxes ⋮ On some probabilistic approximations for AES-like S-boxes ⋮ Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows ⋮ Distinguishing properties and applications of higher order derivatives of Boolean functions ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure ⋮ Analysis of the CAESAR Candidate Silver ⋮ A Statistical Saturation Attack against the Block Cipher PRESENT ⋮ Modeling for three-subset division property without unknown subset ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Показатели рассеивания линейной среды AES-подобных алгоритмов шифрования ⋮ Differential and linear cryptanalysis for 2-round spns ⋮ On some properties of an XSL-network ⋮ Related-key attack on 5-round Kuznyechik ⋮ Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 ⋮ New slide attacks on almost self-similar ciphers ⋮ Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ Square Attack on 7-Round Kiasu-BC ⋮ PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers ⋮ On the (im)possibility of improving the round diffusion of generalized Feistel structures ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- On the distribution of characteristics in bijective mappings
- Markov Ciphers and Differential Cryptanalysis
- Truncated differentials of SAFER
- The cipher SHARK
- Attacks on block ciphers of low algebraic degree
This page was built for publication: The block cipher Square