The following pages link to Fast Software Encryption (Q2946867):
Displaying 50 items.
- Complementing Feistel Ciphers (Q2946868) (← links)
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 (Q2946869) (← links)
- Cryptanalysis of WIDEA (Q2946870) (← links)
- Towards Secure Distance Bounding (Q2946871) (← links)
- Reflection Cryptanalysis of PRINCE-Like Ciphers (Q2946872) (← links)
- Security Analysis of PRINCE (Q2946873) (← links)
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ (Q2946874) (← links)
- Tweakable Blockciphers with Asymptotically Optimal Security (Q2946875) (← links)
- Smashing WEP in a Passive Attack (Q2946877) (← links)
- Full Plaintext Recovery Attack on Broadcast RC4 (Q2946878) (← links)
- Time-Memory Trade-Offs for Near-Collisions (Q2946879) (← links)
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials (Q2946880) (← links)
- Rotational Cryptanalysis of Round-Reduced Keccak (Q2946881) (← links)
- Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 (Q2946882) (← links)
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes (Q2946883) (← links)
- Secure Message Authentication Against Related-Key Attack (Q2946884) (← links)
- Attacks and Security Proofs of EAX-Prime (Q2946885) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- On Symmetric Encryption with Distinguishable Decryption Failures (Q2946887) (← links)
- Higher-Order Side Channel Security and Mask Refreshing (Q2946888) (← links)
- Masking Tables—An Underestimated Security Risk (Q2946889) (← links)
- ALE: AES-Based Lightweight Authenticated Encryption (Q2946890) (← links)
- Related-Key Attacks Against Full Hummingbird-2 (Q2946891) (← links)
- A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones (Q2946892) (← links)
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks (Q2946893) (← links)
- Near Collision Attack on the Grain v1 Stream Cipher (Q2946894) (← links)
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES (Q2946895) (← links)
- A Framework for Automated Independent-Biclique Cryptanalysis (Q2946897) (← links)
- A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox (Q2946898) (← links)
- Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes (Q2946900) (← links)
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations (Q2946901) (← links)
- SPRING: Fast Pseudorandom Functions from Rounded Ring Products (Q2946902) (← links)
- Match Box Meet-in-the-Middle Attack Against KATAN (Q2946903) (← links)
- Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 (Q2946904) (← links)
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers (Q2946905) (← links)
- Improved Single-Key Attacks on 9-Round AES-192/256 (Q2946906) (← links)
- CLOC: Authenticated Encryption for Short Input (Q2946908) (← links)
- APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography (Q2946909) (← links)
- COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse (Q2946910) (← links)
- Pipelineable On-line Encryption (Q2946911) (← links)
- Cryptanalysis of FIDES (Q2946912) (← links)
- Security Analysis of Key-Alternating Feistel Ciphers (Q2946913) (← links)
- The Related-Key Analysis of Feistel Constructions (Q2946914) (← links)
- The Indistinguishability of the XOR of $$k$$ Permutations (Q2946915) (← links)
- Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs (Q2946916) (← links)
- Plaintext Recovery Attacks Against WPA/TKIP (Q2946917) (← links)
- Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA (Q2946918) (← links)
- Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro (Q2946919) (← links)
- Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 (Q2946920) (← links)
- Differential-Linear Cryptanalysis Revisited (Q2946921) (← links)