SHARK
From MaRDI portal
Software:33754
swMATH21955MaRDI QIDQ33754FDOQ33754
Author name not available (Why is that?)
Cited In (20)
- Multi-objective optimisation of bijective S-boxes
- Анализ влияния линейной избыточности в S-боксах на аффинную эквивалентность в раундовых функциях XSL-схем
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- TWOPRIME: A fast stream ciphering algorithm
- FASTA -- a stream cipher for fast FHE evaluation
- Almost involutory recursive MDS diffusion layers
- On unbalanced feistel networks with contracting MDS diffusion
- Generation algorithm of a sort of P-permutations
- The block cipher Square
- New criteria for linear maps in AES-like ciphers
- Wide Trail Design Strategy for Binary MixColumns
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- On security of a white-box implementation of SHARK
- On a generalization of substitution-permutation networks: the HADES design strategy
- On some probabilistic approximations for AES-like S-boxes
- Рассеивающие свойства XSLP-шифров
- Linear cryptanalysis of FF3-1 and FEA
- The interpolation attack on block ciphers
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications
- 3D: A Three-Dimensional Block Cipher
This page was built for software: SHARK