MARVELlous
From MaRDI portal
Software:5972843
swMATH46562MaRDI QIDQ5972843FDOQ5972843
Author name not available (Why is that?)
Source code repository: https://github.com/IAIK/marvellous-attacks
Cited In (9)
- Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath
- Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- On succinct non-interactive arguments in relativized worlds
- \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields
- On a generalization of substitution-permutation networks: the HADES design strategy
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC
- On the algebraic degree of iterated power functions
- The inverse of \(\chi\) and its applications to Rasta-like ciphers
This page was built for software: MARVELlous