The following pages link to (Q2778856):
Displaying 44 items.
- A methodology for differential-linear cryptanalysis and its applications (Q499655) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- Improved (related-key) differential cryptanalysis on GIFT (Q832340) (← links)
- Finding the differential characteristics of block ciphers with neural networks (Q933659) (← links)
- On the boomerang uniformity of quadratic permutations (Q2004976) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- The retracing boomerang attack (Q2055612) (← links)
- New attacks from old distinguishers improved attacks on serpent (Q2152176) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis (Q2161424) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 (Q2179384) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- Investigations on \(c\)-boomerang uniformity and perfect nonlinearity (Q2231773) (← links)
- Impossible differential cryptanalysis of advanced encryption standard (Q2385406) (← links)
- Differential-linear cryptanalysis revisited (Q2408590) (← links)
- Differential attack on five rounds of the SC2000 block cipher (Q2434544) (← links)
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher (Q2437779) (← links)
- The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic (Q2673777) (← links)
- A bit-vector differential model for the modular addition by a constant (Q2692348) (← links)
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA (Q2794507) (← links)
- Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework (Q2817822) (← links)
- Practical Attack on the Full MMB Block Cipher (Q2889870) (← links)
- Boomerang Attacks on Hash Function Using Auxiliary Differentials (Q2890006) (← links)
- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers (Q2942832) (← links)
- Differential-Multiple Linear Cryptanalysis (Q3056878) (← links)
- On Related-Key Attacks and KASUMI: The Case of A5/3 (Q3104731) (← links)
- A new method for impossible differential cryptanalysis of 8-round advanced encryption standard (Q3443221) (← links)
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis (Q3452233) (← links)
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications (Q3452237) (← links)
- Boomerang Attack on Step-Reduced SHA-512 (Q3454592) (← links)
- Differential Cryptanalysis of Reduced-Round PRESENT (Q3506371) (← links)
- Cryptanalysis of Reduced-Round SMS4 Block Cipher (Q3511164) (← links)
- A Unified Approach to Related-Key Attacks (Q3525662) (← links)
- New Applications of Differential Bounds of the SDS Structure (Q3540157) (← links)
- Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent (Q3600320) (← links)
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT (Q3634486) (← links)
- On Integral Distinguishers of Rijndael Family of Ciphers (Q4912029) (← links)
- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 (Q5385513) (← links)
- New Related-Key Boomerang Attacks on AES (Q5504629) (← links)
- A Differential-Linear Attack on 12-Round Serpent (Q5504632) (← links)
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities (Q5918865) (← links)
- New results on quantum boomerang attacks (Q6039807) (← links)