Pages that link to "Item:Q5387107"
From MaRDI portal
The following pages link to Known-Key Distinguishers for Some Block Ciphers (Q5387107):
Displaying 36 items.
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- New criterion for diffusion property and applications to improved GFS and EGFN (Q329176) (← links)
- Truncated differential based known-key attacks on round-reduced SIMON (Q522222) (← links)
- Revisiting Gilbert's known-key distinguisher (Q780379) (← links)
- Weak-key distinguishers for AES (Q832335) (← links)
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes (Q893871) (← links)
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers (Q1749792) (← links)
- Revisiting AES related-key differential attacks with constraint programming (Q1799563) (← links)
- On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers (Q1944937) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- Rotational cryptanalysis on MAC algorithm chaskey (Q2229269) (← links)
- An observation on NORX, BLAKE2, and ChaCha (Q2274480) (← links)
- Distinguisher on full-round compression function of GOST R (Q2294437) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Fast garbling of circuits under standard assumptions (Q2413616) (← links)
- Integral distinguishers for reduced-round Stribog (Q2448116) (← links)
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC (Q2692352) (← links)
- New Insights on AES-Like SPN Ciphers (Q2835602) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- Masking Tables—An Underestimated Security Risk (Q2946889) (← links)
- Linear Analysis of Reduced-Round CubeHash (Q3011313) (← links)
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function (Q3013080) (← links)
- Higher-Order Differential Properties of Keccak and Luffa (Q3013088) (← links)
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool (Q3013095) (← links)
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes (Q3013096) (← links)
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 (Q3084240) (← links)
- Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity (Q3098004) (← links)
- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique (Q3454593) (← links)
- Multi-key Security: The Even-Mansour Construction Revisited (Q3457111) (← links)
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? (Q3506390) (← links)
- Cryptanalysis of the GOST Hash Function (Q3600219) (← links)
- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks (Q3637132) (← links)
- Cryptanalysis of Tweaked Versions of SMASH and Reparation (Q3644197) (← links)
- Strengthening the Known-Key Security Notion for Block Ciphers (Q4639495) (← links)
- On Integral Distinguishers of Rijndael Family of Ciphers (Q4912029) (← links)
- Public-Seed Pseudorandom Permutations (Q5738982) (← links)