Cited in
(48)- Modeling energy-efficient secure communications in multi-mode wireless mobile devices
- The differential analysis of S-functions
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Differential Fault Analysis of Twofish
- scientific article; zbMATH DE number 1759268 (Why is no real title available?)
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- scientific article; zbMATH DE number 1759296 (Why is no real title available?)
- scientific article; zbMATH DE number 1759287 (Why is no real title available?)
- Обобщенные квази-адамаровы преобразования на конечных группах
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- Randomized nonlinear software-oriented MDS diffusion layers
- On Constructions of Involutory MDS Matrices
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- Towards the optimality of Feistel ciphers with substitution-permutation functions
- GPU-based implementation of 128-bit secure eta pairing over a binary field
- scientific article; zbMATH DE number 1583936 (Why is no real title available?)
- Evolutionary ciphers against differential power analysis and differential fault analysis
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Cryptographic properties of cyclic binary matrices
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme
- Side-channeling the \textsf{Kalyna} key expansion
- MinT
- Whirlwind
- Selected Areas in Cryptography
- TinyECC
- FOX
- LSIC
- SHARK
- SNOW
- SAFER
- Serpent
- Blowfish
- Cryptanalysis of a Generic Class of White-Box Implementations
- scientific article; zbMATH DE number 1304123 (Why is no real title available?)
- Mastik
- scientific article; zbMATH DE number 1878319 (Why is no real title available?)
- Kuznyechik
- Slender-set differential cryptanalysis
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- On Feistel Structures Using a Diffusion Switching Mechanism
- The Saturation Attack — A Bait for Twofish
- Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method
- New statistical randomness tests based on length of runs
- scientific article; zbMATH DE number 7228861 (Why is no real title available?)
- scientific article; zbMATH DE number 1304106 (Why is no real title available?)
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- Design of image cipher using Latin squares
This page was built for software: Twofish