Square
From MaRDI portal
Software:38017
swMATH26286MaRDI QIDQ38017FDOQ38017
Author name not available (Why is that?)
Cited In (73)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Multi-objective optimisation of bijective S-boxes
- WARP: revisiting GFN for lightweight 128-bit block cipher
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Square reflection cryptanalysis of 5-round Feistel networks with permutations
- Integral characteristics by keyspace partitioning
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- Impossible differential cryptanalysis using matrix method
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function
- Integral cryptanalysis on full MISTY1
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- Security evaluation of MISTY structure with SPN round function
- Meet-in-the-middle attacks on 10-round AES-256
- Impossible differential cryptanalysis of advanced encryption standard
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Efficient slide attacks
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
- Differential and linear cryptanalysis for 2-round spns
- Automatic search for bit-based division property
- Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- More accurate division property propagations based on optimized implementations of linear layers
- Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- New related-key rectangle attacks on reduced AES-192 and AES-256
- Modeling for three-subset division property without unknown subset
- Generation algorithm of a sort of P-permutations
- Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- The block cipher Square
- Lower bounds on the degree of block ciphers
- New criteria for linear maps in AES-like ciphers
- An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums
- On a generalization of substitution-permutation networks: the HADES design strategy
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- A New Structural-Differential Property of 5-Round AES
- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
- Square Attack on 7-Round Kiasu-BC
- A $$2^{70}$$ Attack on the Full MISTY1
- Improved key-recovery attacks on reduced-round WEM-8
- Revisiting Gilbert's known-key distinguisher
- On some probabilistic approximations for AES-like S-boxes
- New Insights on AES-Like SPN Ciphers
- On Integral Distinguishers of Rijndael Family of Ciphers
- Practical-time attacks against reduced variants of~MISTY1
- Cryptanalysis of Feistel Networks with Secret Round Functions
- Structural cryptanalysis of SASAS
- Extended meet-in-the-middle attacks on some Feistel constructions
- Integral distinguishers for reduced-round Stribog
- \(k\)-configurations
- SQUARE attack on block ciphers with low algebraic degree
- Distinguishing properties and applications of higher order derivatives of Boolean functions
- Cube Attacks on Tweakable Black Box Polynomials
- Improving the security and efficiency of block ciphers based on LS-designs
- Another View of the Division Property
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- Statistical integral attack on CAST-256 and IDEA
- 3D: A Three-Dimensional Block Cipher
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
- PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Analysis of the CAESAR Candidate Silver
- SPF: A New Family of Efficient Format-Preserving Encryption Algorithms
- Wide Trail Design Strategy for Binary MixColumns
- Показатели рассеивания линейной среды AES-подобных алгоритмов шифрования
- On some properties of an XSL-network
- Related-key attack on 5-round Kuznyechik
This page was built for software: Square