Serpent
From MaRDI portal
Software:33786
swMATH21989MaRDI QIDQ33786FDOQ33786
Author name not available (Why is that?)
Cited In (54)
- An algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomial
- Improved Integral Attack on Generalized Feistel Cipher
- Wave-shaped round functions and primitive groups
- Differential attacks: using alternative operations
- The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions
- A note on some algebraic trapdoors for block ciphers
- Efficient cache attacks on AES, and countermeasures
- Type-preserving matrices and security of block ciphers
- Title not available (Why is that?)
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Differential-linear cryptanalysis from an algebraic perspective
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
- On weakly APN functions and 4-bit S-boxes
- The design of composite permutations with applications to DES-like S-boxes
- A note on APN permutations in even dimension
- Differential-linear cryptanalysis revisited
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Serpent: A New Block Cipher Proposal
- On hidden sums compatible with a given block cipher diffusion layer
- On some block ciphers and imprimitive groups
- Parallel algorithms development for programmable devices with application from cryptography
- Finding the differential characteristics of block ciphers with neural networks
- Multidimensional linear cryptanalysis
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Cryptographic Analysis of All 4 × 4-Bit S-Boxes
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Cryptanalysis of Hummingbird-1
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices
- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
- New attacks from old distinguishers improved attacks on serpent
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- New statistical randomness tests based on length of runs
- Primitivity of PRESENT and other lightweight ciphers
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- New criteria for linear maps in AES-like ciphers
- Pen and Paper Arguments for SIMON and SIMON-like Designs
- GIFT: A Small Present
- Designing against a class of algebraic attacks on symmetric block ciphers
- Differential Fault Analysis of Sosemanuk
- Cryptanalysis of a Generic Class of White-Box Implementations
- Revisiting key schedule's diffusion in relation with round function's diffusion
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices
- Structural cryptanalysis of SASAS
- Comparative performance of the classifiers for cryptosystem identification
- A Differential-Linear Attack on 12-Round Serpent
- A methodology for differential-linear cryptanalysis and its applications
- On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion
- On the multiplicative complexity of Boolean functions and bitsliced higher-order masking
- Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\)
- Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes
- Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited
This page was built for software: Serpent