The following pages link to (Q4537984):
Displayed 39 items.
- A methodology for differential-linear cryptanalysis and its applications (Q499655) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- Improved (related-key) differential cryptanalysis on GIFT (Q832340) (← links)
- On the boomerang uniformity of quadratic permutations (Q2004976) (← links)
- On the boomerang uniformity of some permutation polynomials (Q2040323) (← links)
- Low \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse function (Q2043405) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- The retracing boomerang attack (Q2055612) (← links)
- New attacks from old distinguishers improved attacks on serpent (Q2152176) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 (Q2179384) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- Investigations on \(c\)-boomerang uniformity and perfect nonlinearity (Q2231773) (← links)
- Differential-linear cryptanalysis revisited (Q2408590) (← links)
- Differential attack on five rounds of the SC2000 block cipher (Q2434544) (← links)
- The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic (Q2673777) (← links)
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA (Q2794507) (← links)
- Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework (Q2817822) (← links)
- Practical Attack on the Full MMB Block Cipher (Q2889870) (← links)
- Boomerang Attacks on Hash Function Using Auxiliary Differentials (Q2890006) (← links)
- Boomerang Attacks on BLAKE-32 (Q3013086) (← links)
- Mars Attacks! Revisited: (Q3104728) (← links)
- On Related-Key Attacks and KASUMI: The Case of A5/3 (Q3104731) (← links)
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis (Q3452233) (← links)
- Boomerang Attack on Step-Reduced SHA-512 (Q3454592) (← links)
- Cryptanalysis of Reduced-Round SMS4 Block Cipher (Q3511164) (← links)
- New Applications of Differential Bounds of the SDS Structure (Q3540157) (← links)
- Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent (Q3600320) (← links)
- On Integral Distinguishers of Rijndael Family of Ciphers (Q4912029) (← links)
- (Q5146115) (← links)
- (Q5150547) (← links)
- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 (Q5385513) (← links)
- New Related-Key Boomerang Attacks on AES (Q5504629) (← links)
- A Differential-Linear Attack on 12-Round Serpent (Q5504632) (← links)
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities (Q5918865) (← links)
- New results on quantum boomerang attacks (Q6039807) (← links)
- Key structures: improved related-key boomerang attack against the full AES-256 (Q6108767) (← links)
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} (Q6135400) (← links)
- Optimizing rectangle attacks: a unified and generic framework for key recovery (Q6135405) (← links)