Cited in
(30)- Analyzing the influence of linear redundancy in S-boxes on the affine equivalence within XSL-like round functions
- A generation algorithm of a sort of \(P\)-permutations
- New criteria for linear maps in AES-like ciphers
- Wide Trail Design Strategy for Binary MixColumns
- The block cipher \textsc{Square}
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- FASTA -- a stream cipher for fast FHE evaluation
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications
- On some probabilistic approximations for AES-like S-boxes
- PHOTON
- Whirlpool
- Twofish
- 3D: A Three-Dimensional Block Cipher
- MacGuffin
- TWOPRIME
- Square
- LowMC
- Ciminion
- Minalpher
- Almost involutory recursive MDS diffusion layers
- \textsc{TWOPRIME}: a fast stream ciphering algorithm
- On security of a white-box implementation of SHARK
- maskVerif
- Multi-objective optimisation of bijective S-boxes
- On unbalanced feistel networks with contracting MDS diffusion
- On a generalization of substitution-permutation networks: the HADES design strategy
- The interpolation attack on block ciphers
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- Linear cryptanalysis of FF3-1 and FEA
- Diffusion properties of XSLP-ciphers
This page was built for software: SHARK