Pages that link to "Item:Q2762783"
From MaRDI portal
The following pages link to Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis (Q2762783):
Displayed 45 items.
- Towards the optimality of Feistel ciphers with substitution-permutation functions (Q398983) (← links)
- On the differential and linear efficiency of balanced Feistel networks (Q407580) (← links)
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers (Q436555) (← links)
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices (Q494039) (← links)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (Q510482) (← links)
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes (Q893871) (← links)
- New criteria for linear maps in AES-like ciphers (Q1032487) (← links)
- A simple power analysis attack against the key schedule of the Camellia block cipher (Q1041799) (← links)
- Making the impossible possible (Q1747659) (← links)
- Generalized Feistel networks revisited (Q1934218) (← links)
- Differential cryptanalysis of eight-round SEED (Q1944926) (← links)
- Impossible differential attack on 13-round Camellia-192 (Q2346554) (← links)
- On the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformations (Q2349621) (← links)
- A note on APN permutations in even dimension (Q2363313) (← links)
- On the construction of differentially 4-uniform involutions (Q2401973) (← links)
- Differential property of \textsc{Present}-like structure (Q2413209) (← links)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher (Q2437779) (← links)
- On computational complexity of impossible differential cryptanalysis (Q2446068) (← links)
- Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme (Q2491299) (← links)
- On some probabilistic approximations for AES-like S-boxes (Q2501584) (← links)
- Revisiting key schedule's diffusion in relation with round function's diffusion (Q2510656) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- Security evaluation of MISTY structure with SPN round function (Q2629406) (← links)
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- Improved Attacks on Reduced-Round Camellia-128/192/256 (Q2790031) (← links)
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes (Q2807199) (← links)
- Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure (Q2807222) (← links)
- Impossible Differential Cryptanalysis of 14-Round Camellia-192 (Q2817824) (← links)
- Wide Trail Design Strategy for Binary MixColumns (Q2822689) (← links)
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks (Q2829214) (← links)
- New Insights on Impossible Differential Cryptanalysis (Q2889875) (← links)
- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers (Q2942832) (← links)
- Complementing Feistel Ciphers (Q2946868) (← links)
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 (Q2946869) (← links)
- Impossible Differentials of SPN Ciphers (Q2980845) (← links)
- LBlock: A Lightweight Block Cipher (Q3011308) (← links)
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines (Q3104724) (← links)
- On Linear Hulls and Trails (Q3179489) (← links)
- Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis (Q3457106) (← links)
- Classifying 8-Bit to 8-Bit S-Boxes Based on Power Mappings from the Point of DDT and LAT Distributions (Q3519557) (← links)
- New Applications of Differential Bounds of the SDS Structure (Q3540157) (← links)
- Generic Attacks on Feistel Networks with Internal Permutations (Q3637131) (← links)
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 (Q5458952) (← links)
- Chai-Tea, Cryptographic Hardware Implementations of xTEA (Q5504636) (← links)
- More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\) (Q5963363) (← links)