Fast Software Encryption
From MaRDI portal
Publication:5902491
DOI10.1007/b93938zbMath1254.94040OpenAlexW2505253445WikidataQ56387660 ScholiaQ56387660MaRDI QIDQ5902491
Soo Hak Sung, Sang Jin Lee, Jong In Lim, Sang Woo Park
Publication date: 5 January 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b93938
Related Items (23)
ASC-1: An Authenticated Encryption Stream Cipher ⋮ Security evaluation of MISTY structure with SPN round function ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ Counting active S-boxes is not enough ⋮ Cryptographic properties of a new national encryption standard of Ukraine ⋮ Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers ⋮ An algorithm for computing the upper bound for non-minimum weight differentials in 2-round LSX-ciphers ⋮ Differential property of \textsc{Present}-like structure ⋮ Differential Attacks Against SPN: A Thorough Analysis ⋮ Generalized Feistel networks revisited ⋮ On the differential and linear efficiency of balanced Feistel networks ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ Krip: high-speed hardware-oriented stream cipher based on a non-autonomous nonlinear shift register ⋮ Constructing and deconstructing intentional weaknesses in symmetric ciphers ⋮ New Applications of Differential Bounds of the SDS Structure ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ Two notions of differential equivalence on Sboxes ⋮ Cryptographic properties and application of a generalized unbalanced Feistel network structure ⋮ Group theoretic properties of Rijndael-like ciphers ⋮ Security Analysis of SIMD ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles ⋮ New criteria for linear maps in AES-like ciphers
This page was built for publication: Fast Software Encryption