FOX
From MaRDI portal
Software:25500
swMATH13586MaRDI QIDQ25500FDOQ25500
Author name not available (Why is that?)
Cited In (25)
- Selected Areas in Cryptography
- Minimizing the two-round Even-Mansour cipher
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- Construction of higher-level MDS matrices in nested SPNs
- Selected Areas in Cryptography
- Information security and cryptology -- ICISC 2005. 8th international conference, Seoul, Korea, December 1--2, 2005. Revised selected papers.
- Towards a general construction of recursive MDS diffusion layers
- Pseudorandomness analysis of the (extended) Lai-Massey scheme
- Linear Cryptanalysis of Non Binary Ciphers
- Boomerang uniformity of popular S-box constructions
- Cycle structures of orthomorphisms extending partial orthomorphisms of Boolean groups
- On the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\)
- On Lai-Massey and quasi-Feistel ciphers
- New Attacks on Feistel Structures with Improved Memory Complexities
- The DBlock family of block ciphers
- Compositions and parities of complete mappings and of orthomorphisms
- Fast Software Encryption
- On Constructions of Involutory MDS Matrices
- Information Security and Cryptology - ICISC 2005
- On the direct construction of recursive MDS matrices
- GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications
- On computational complexity of impossible differential cryptanalysis
- Generic attacks on the Lai-Massey scheme
This page was built for software: FOX