The following pages link to (Q4941816):
Displaying 50 items.
- Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305) (← links)
- A practical attack on KeeLoq (Q421044) (← links)
- AKF: a key alternating Feistel scheme for lightweight cipher designs (Q477688) (← links)
- Observing biases in the state: case studies with Trivium and Trivia-SC (Q510484) (← links)
- Some remarks on the TKIP key mixing function of IEEE 802.11i (Q615203) (← links)
- Cryptographic properties and application of a generalized unbalanced Feistel network structure (Q662179) (← links)
- Related-key analysis of generalized Feistel networks with expanding round functions (Q826269) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Reflections on slide with a twist attacks (Q887444) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers (Q1944937) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 (Q2010591) (← links)
- Slidex attacks on the Even-Mansour encryption scheme (Q2018815) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- New slide attacks on almost self-similar ciphers (Q2055611) (← links)
- Three third generation attacks on the format preserving encryption scheme FF3 (Q2056726) (← links)
- Improved BV-based quantum attack on block ciphers (Q2110996) (← links)
- TNT: how to tweak a block cipher (Q2119027) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Quantum attacks on some Feistel block ciphers (Q2182081) (← links)
- Troika: a ternary cryptographic hash function (Q2285779) (← links)
- Quark: a lightweight hash (Q2377065) (← links)
- Aggregated differentials and cryptanalysis of PP-1 and GOST (Q2392055) (← links)
- Efficient slide attacks (Q2413611) (← links)
- A compress slide attack on the full GOST block cipher (Q2444859) (← links)
- Reflection cryptanalysis of PRINCE-like ciphers (Q2516533) (← links)
- Related-Key Attack on Full-Round PICARO (Q2807197) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher (Q2945086) (← links)
- Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher (Q2946448) (← links)
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials (Q2946880) (← links)
- Nonlinear Invariant Attack (Q2953771) (← links)
- Design Strategies for ARX with Provable Bounds: Sparx and LAX (Q2958134) (← links)
- A Single-Key Attack on the Full GOST Block Cipher (Q3013090) (← links)
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis (Q3452233) (← links)
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications (Q3452237) (← links)
- Analysis of Grain’s Initialization Algorithm (Q3506388) (← links)
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? (Q3506390) (← links)
- A Unified Approach to Related-Key Attacks (Q3525662) (← links)
- Algebraic and Slide Attacks on KeeLoq (Q3525663) (← links)
- Linear Slide Attacks on the KeeLoq Block Cipher (Q3600321) (← links)
- Slide Attacks on a Class of Hash Functions (Q3600370) (← links)
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Q3634484) (← links)
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT (Q3634486) (← links)
- (Q5147370) (← links)
- A Practical Attack on KeeLoq (Q5458582) (← links)
- 3D: A Three-Dimensional Block Cipher (Q5502767) (← links)
- Reflection Cryptanalysis of Some Ciphers (Q5504631) (← links)