Pages that link to "Item:Q2044758"
From MaRDI portal
The following pages link to \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758):
Displaying 21 items.
- Automatic search for bit-based division property (Q2146095) (← links)
- Computing the distribution of differentials over the non-linear mapping \(\chi \) (Q2154056) (← links)
- Differential and linear properties of vectorial Boolean functions based on chi (Q6088855) (← links)
- Reconsidering generic composition: the modes A10, A11 and A12 are insecure (Q6535483) (← links)
- Preimage attacks on reduced-round \textsc{Ascon-Xof} (Q6587200) (← links)
- Exact security analysis of ASCON (Q6595818) (← links)
- Revisiting higher-order differential-linear attacks from an algebraic perspective (Q6595822) (← links)
- Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \) (Q6605894) (← links)
- A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH (Q6620030) (← links)
- Multimixer-156: universal keyed hashing based on integer multiplication and cyclic shift (Q6623290) (← links)
- Designing full-rate \textsf{Sponge} based AEAD modes (Q6623296) (← links)
- \textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions (Q6636119) (← links)
- Massive superpoly recovery with a meet-in-the-middle framework. Improved cube attacks on \textsc{Trivium} and Kreyvium (Q6636398) (← links)
- Generalized Feistel ciphers for efficient prime field masking (Q6637329) (← links)
- Generic MitM attack frameworks on sponge constructions (Q6652908) (← links)
- Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT (Q6652909) (← links)
- Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations (Q6652910) (← links)
- Improving generic attacks using exceptional functions (Q6652911) (← links)
- Succinctly-committing authenticated encryption (Q6652924) (← links)
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits (Q6652926) (← links)
- Algebraic structure of the iterates of \(\chi \) (Q6652928) (← links)