MARVELlous
From MaRDI portal
Software:5972843
No author found.
Source code repository: https://github.com/IAIK/marvellous-attacks
Related Items (9)
Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath ⋮ Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions ⋮ On succinct non-interactive arguments in relativized worlds ⋮ An algebraic attack on ciphers with low-degree round functions: application to full MiMC ⋮ On the algebraic degree of iterated power functions ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ The inverse of \(\chi\) and its applications to Rasta-like ciphers ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
This page was built for software: MARVELlous