Twofish
From MaRDI portal
Software:25499
swMATH13585MaRDI QIDQ25499FDOQ25499
Author name not available (Why is that?)
Cited In (36)
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- Slender-set differential cryptanalysis
- Title not available (Why is that?)
- Randomized nonlinear software-oriented MDS diffusion layers
- Selected Areas in Cryptography
- The Saturation Attack — A Bait for Twofish
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- Обобщенные квази-адамаровы преобразования на конечных группах
- Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
- Cryptographic properties of cyclic binary matrices
- Title not available (Why is that?)
- Title not available (Why is that?)
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Title not available (Why is that?)
- Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method
- New statistical randomness tests based on length of runs
- Design of image cipher using Latin squares
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptanalysis of a Generic Class of White-Box Implementations
- Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
- On Feistel Structures Using a Diffusion Switching Mechanism
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- Evolutionary ciphers against differential power analysis and differential fault analysis
- Title not available (Why is that?)
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- Differential Fault Analysis of Twofish
- On Constructions of Involutory MDS Matrices
- GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field
- The Differential Analysis of S-Functions
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications
- Side-channeling the \textsf{Kalyna} key expansion
- Title not available (Why is that?)
This page was built for software: Twofish