Square
From MaRDI portal
Software:38017
No author found.
Related Items (73)
A new method for impossible differential cryptanalysis of 8-round advanced encryption standard ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ SQUARE attack on block ciphers with low algebraic degree ⋮ \(k\)-configurations ⋮ Applications of design theory for the constructions of MDS matrices for lightweight cryptography ⋮ Security evaluation of MISTY structure with SPN round function ⋮ Meet-in-the-middle attacks on 10-round AES-256 ⋮ Extended meet-in-the-middle attacks on some Feistel constructions ⋮ SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ Automatic search for bit-based division property ⋮ Impossible differential cryptanalysis of advanced encryption standard ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Structural cryptanalysis of SASAS ⋮ Integral cryptanalysis on full MISTY1 ⋮ Efficient slide attacks ⋮ Improved key-recovery attacks on reduced-round WEM-8 ⋮ Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ Lower bounds on the degree of block ciphers ⋮ The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ Square reflection cryptanalysis of 5-round Feistel networks with permutations ⋮ Integral distinguishers for reduced-round Stribog ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ The block cipher Square ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Statistical integral attack on CAST-256 and IDEA ⋮ Statistical integral distinguisher with multi-structure and its application on AES-like ciphers ⋮ Generation algorithm of a sort of P-permutations ⋮ On Integral Distinguishers of Rijndael Family of Ciphers ⋮ Impossible differential cryptanalysis using matrix method ⋮ A New Structural-Differential Property of 5-Round AES ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ New related-key rectangle attacks on reduced AES-192 and AES-256 ⋮ Multi-objective optimisation of bijective S-boxes ⋮ On some probabilistic approximations for AES-like S-boxes ⋮ Distinguishing properties and applications of higher order derivatives of Boolean functions ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure ⋮ Analysis of the CAESAR Candidate Silver ⋮ A Statistical Saturation Attack against the Block Cipher PRESENT ⋮ Modeling for three-subset division property without unknown subset ⋮ Cube Attacks on Tweakable Black Box Polynomials ⋮ Показатели рассеивания линейной среды AES-подобных алгоритмов шифрования ⋮ Differential and linear cryptanalysis for 2-round spns ⋮ On some properties of an XSL-network ⋮ Related-key attack on 5-round Kuznyechik ⋮ Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ Square Attack on 7-Round Kiasu-BC ⋮ PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ New criteria for linear maps in AES-like ciphers ⋮ A $$2^{70}$$ Attack on the Full MISTY1 ⋮ New Insights on AES-Like SPN Ciphers ⋮ Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices ⋮ Another View of the Division Property ⋮ Revisiting Gilbert's known-key distinguisher ⋮ 3D: A Three-Dimensional Block Cipher ⋮ New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers ⋮ Integral characteristics by keyspace partitioning ⋮ Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
This page was built for software: Square