Pages that link to "Item:Q4412802"
From MaRDI portal
The following pages link to Enhancing Differential-Linear Cryptanalysis (Q4412802):
Displaying 33 items.
- A methodology for differential-linear cryptanalysis and its applications (Q499655) (← links)
- The (related-key) impossible boomerang attack and its application to the AES block cipher (Q543423) (← links)
- Differential-linear cryptanalysis from an algebraic perspective (Q2128998) (← links)
- Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT (Q2151298) (← links)
- New attacks from old distinguishers improved attacks on serpent (Q2152176) (← links)
- Survey on recent trends towards generalized differential and boomerang uniformities (Q2154879) (← links)
- Revamped differential-linear cryptanalysis on reduced round ChaCha (Q2170082) (← links)
- Vectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type construction (Q2179399) (← links)
- Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity (Q2238913) (← links)
- Differential-linear cryptanalysis revisited (Q2408590) (← links)
- Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256 (Q2628121) (← links)
- Cryptanalysis of Ascon (Q2790053) (← links)
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher (Q2889869) (← links)
- Differential-Linear Cryptanalysis Revisited (Q2946921) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- Improved Differential Cryptanalysis of CAST-128 and CAST-256 (Q2980843) (← links)
- Differential-Multiple Linear Cryptanalysis (Q3056878) (← links)
- Improved Linear Differential Attacks on CubeHash (Q3558325) (← links)
- Cryptanalysis of CTC2 (Q3623047) (← links)
- (Q4314015) (← links)
- Related-Key Differential-Linear Attacks on Reduced AES-192 (Q5458202) (← links)
- Fast Software Encryption (Q5473584) (← links)
- A Differential-Linear Attack on 12-Round Serpent (Q5504632) (← links)
- Improved differential-linear attacks with applications to ARX ciphers (Q5918561) (← links)
- Fully automated differential-linear attacks against ARX ciphers (Q6080907) (← links)
- Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers (Q6535476) (← links)
- Differential-linear cryptanalysis of round-reduced SPARX-64/128 (Q6575045) (← links)
- Differential-linear approximation semi-unconstrained searching and partition tree: application to LEA and Speck (Q6595814) (← links)
- Revisiting higher-order differential-linear attacks from an algebraic perspective (Q6595822) (← links)
- Another look at differential-linear attacks (Q6619841) (← links)
- New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128 (Q6643239) (← links)
- Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT (Q6652909) (← links)
- New approaches for estimating the bias of differential-linear distinguishers (Q6652916) (← links)