Pages that link to "Item:Q4899194"
From MaRDI portal
The following pages link to Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming (Q4899194):
Displaying 50 items.
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures (Q404952) (← links)
- The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers (Q436555) (← links)
- A new counting method to bound the number of active S-boxes in Rijndael and 3D (Q522208) (← links)
- Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys (Q826250) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network (Q1698641) (← links)
- Cryptanalysis of Simpira v1 (Q1698642) (← links)
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis (Q1726672) (← links)
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK (Q1981795) (← links)
- The resistance of PRESENT-80 against related-key differential attacks (Q2016426) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714) (← links)
- A deeper look at machine learning-based cryptanalysis (Q2056717) (← links)
- Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem (Q2056746) (← links)
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (Q2068387) (← links)
- Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack (Q2104924) (← links)
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound (Q2119014) (← links)
- Practical key recovery attacks on FlexAEAD (Q2119949) (← links)
- Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis (Q2146092) (← links)
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT (Q2151298) (← links)
- More accurate division property propagations based on optimized implementations of linear layers (Q2151301) (← links)
- Counting active S-boxes is not enough (Q2152037) (← links)
- MILP based differential attack on round reduced WARP (Q2154058) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis (Q2170083) (← links)
- The MILP-aided conditional differential attack and its application to Trivium (Q2227128) (← links)
- Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode (Q2229266) (← links)
- Computing AES related-key differential characteristics with constraint programming (Q2289026) (← links)
- More accurate results on the provable security of AES against impossible differential cryptanalysis (Q2334448) (← links)
- Security analysis of SIMECK block cipher against related-key impossible differential (Q2414040) (← links)
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (Q2416936) (← links)
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions (Q2692350) (← links)
- Quantum collision attacks on AES-like hashing with low quantum random access memories (Q2692403) (← links)
- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows (Q2790029) (← links)
- Wide Trail Design Strategy for Binary MixColumns (Q2822689) (← links)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey (Q2822690) (← links)
- Pen and Paper Arguments for SIMON and SIMON-like Designs (Q2827732) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Improved Top-Down Techniques in Differential Cryptanalysis (Q2946446) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers (Q2958142) (← links)
- Related-Key Cryptanalysis of Midori (Q3179490) (← links)
- Показатели рассеивания линейной среды AES-подобных алгоритмов шифрования (Q3381889) (← links)
- О линейном и разностном криптоанализе AES-подобных алгоритмов шифрования (Q3383125) (← links)
- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails (Q3454589) (← links)
- Lombardi Drawings of Knots and Links (Q4625105) (← links)
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck (Q4639483) (← links)
- Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck (Q4639485) (← links)
- Efficient Design Strategies Based on the AES Round Function (Q4639487) (← links)
- Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK (Q5095926) (← links)