Saturnin
From MaRDI portal
Cited in
(12)- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Thinking outside the superbox
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Breaking LWC candidates: sESTATE and Elephant in quantum setting
- Whirlwind
- AEGIS
- tweakey
- Whirlpool
- MISTY
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
This page was built for software: Saturnin