Pages that link to "Item:Q3577970"
From MaRDI portal
The following pages link to Another Look at Complementation Properties (Q3577970):
Displaying 12 items.
- Almost universal forgery attacks on AES-based MAC's (Q494579) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 (Q2010591) (← links)
- Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode (Q2229266) (← links)
- Reflection cryptanalysis of PRINCE-like ciphers (Q2516533) (← links)
- Complementing Feistel Ciphers (Q2946868) (← links)
- Reflection Cryptanalysis of PRINCE-Like Ciphers (Q2946872) (← links)
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials (Q2946880) (← links)
- Nonlinear Invariant Attack (Q2953771) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round XTEA (Q3073711) (← links)
- Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512 (Q3084241) (← links)
- Security Analysis of SIMD (Q3084266) (← links)