Square

From MaRDI portal
Software:38017



swMATH26286MaRDI QIDQ38017


No author found.





Related Items (73)

A new method for impossible differential cryptanalysis of 8-round advanced encryption standardWARP: revisiting GFN for lightweight 128-bit block cipherSQUARE attack on block ciphers with low algebraic degree\(k\)-configurationsApplications of design theory for the constructions of MDS matrices for lightweight cryptographySecurity evaluation of MISTY structure with SPN round functionMeet-in-the-middle attacks on 10-round AES-256Extended meet-in-the-middle attacks on some Feistel constructionsSEA: A Scalable Encryption Algorithm for Small Embedded ApplicationseSPF: A Family of Format-Preserving Encryption Algorithms Using MDS MatricesAutomatic search for bit-based division propertyImpossible differential cryptanalysis of advanced encryption standardMore accurate division property propagations based on optimized implementations of linear layersIntegral attacks on Pyjamask-96 and round-reduced Pyjamask-128Pholkos -- efficient large-state tweakable block ciphers from the AES round functionStructural cryptanalysis of SASASIntegral cryptanalysis on full MISTY1Efficient slide attacksImproved key-recovery attacks on reduced-round WEM-8Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applicationsKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionApplying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block CiphersAn algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sumsLower bounds on the degree of block ciphersThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherSPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsSquare reflection cryptanalysis of 5-round Feistel networks with permutationsIntegral distinguishers for reduced-round StribogPractical-time attacks against reduced variants of~MISTY1The block cipher SquareОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESImproving the security and efficiency of block ciphers based on LS-designsStatistical integral attack on CAST-256 and IDEAStatistical integral distinguisher with multi-structure and its application on AES-like ciphersGeneration algorithm of a sort of P-permutationsOn Integral Distinguishers of Rijndael Family of CiphersImpossible differential cryptanalysis using matrix methodA New Structural-Differential Property of 5-Round AESThe (related-key) impossible boomerang attack and its application to the AES block cipherNew related-key rectangle attacks on reduced AES-192 and AES-256Multi-objective optimisation of bijective S-boxesOn some probabilistic approximations for AES-like S-boxesDistinguishing properties and applications of higher order derivatives of Boolean functionsImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesCryptanalysis of Feistel Networks with Secret Round FunctionsConstructing Lightweight Optimal Diffusion Primitives with Feistel StructureAnalysis of the CAESAR Candidate SilverA Statistical Saturation Attack against the Block Cipher PRESENTModeling for three-subset division property without unknown subsetCube Attacks on Tweakable Black Box PolynomialsПоказатели рассеивания линейной среды AES-подобных алгоритмов шифрованияDifferential and linear cryptanalysis for 2-round spnsOn some properties of an XSL-networkRelated-key attack on 5-round KuznyechikZero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network StructureDistinguishers for Ciphers and Known Key Attack against Rijndael with Large BlocksWide Trail Design Strategy for Binary MixColumnsSquare Attack on 7-Round Kiasu-BCPolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISNew criteria for linear maps in AES-like ciphersA $$2^{70}$$ Attack on the Full MISTY1New Insights on AES-Like SPN CiphersLightweight Multiplication in $$GF(2^n)$$ with Applications to MDS MatricesAnother View of the Division PropertyRevisiting Gilbert's known-key distinguisher3D: A Three-Dimensional Block CipherNew Directions in Cryptanalysis of Self-Synchronizing Stream CiphersIntegral characteristics by keyspace partitioningQuantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AESOn a generalization of substitution-permutation networks: the HADES design strategy


This page was built for software: Square