Pages that link to "Item:Q3102196"
From MaRDI portal
The following pages link to Biclique Cryptanalysis of the Full AES (Q3102196):
Displaying 50 items.
- NSA and dual EC\(\_\)DRBG: Déjà vu all over again? (Q297495) (← links)
- Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305) (← links)
- New criterion for diffusion property and applications to improved GFS and EGFN (Q329176) (← links)
- Biclique cryptanalysis of LBlock and TWINE (Q396619) (← links)
- Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 (Q458737) (← links)
- Using quantum key distribution for cryptographic purposes: a survey (Q477173) (← links)
- An ID-based signcryption scheme with compartmented secret sharing for unsigncryption (Q477604) (← links)
- AKF: a key alternating Feistel scheme for lightweight cipher designs (Q477688) (← links)
- Rotational rebound attacks on reduced Skein (Q744348) (← links)
- On the cost of ASIC hardware crackers: a SHA-1 case study (Q826307) (← links)
- Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks (Q892289) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- The DBlock family of block ciphers (Q893839) (← links)
- Generalized MitM attacks on full TWINE (Q894457) (← links)
- Biclique cryptanalysis on the full Crypton-256 and mCrypton-128 (Q1714657) (← links)
- Making the impossible possible (Q1747659) (← links)
- Symmetric cryptoalgorithms in the residue number system (Q2044024) (← links)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714) (← links)
- Persistent fault analysis with few encryptions (Q2106677) (← links)
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES (Q2118720) (← links)
- On a generalization of substitution-permutation networks: the HADES design strategy (Q2119029) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- The \(t\)-wise independence of substitution-permutation networks (Q2139644) (← links)
- On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer (Q2146073) (← links)
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory (Q2228439) (← links)
- Solving hybrid Boolean constraints in continuous space via multilinear Fourier expansions (Q2238714) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Revisiting key schedule's diffusion in relation with round function's diffusion (Q2510656) (← links)
- Meet-in-the-middle attacks on 10-round AES-256 (Q2630710) (← links)
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC (Q2692352) (← links)
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks (Q2794524) (← links)
- A novel key scheduling scheme for AES algorithm (Q2825266) (← links)
- New Insights on AES-Like SPN Ciphers (Q2835602) (← links)
- Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo (Q2874334) (← links)
- Cryptanalysis of the full AES using GPU-like special-purpose hardware (Q2883168) (← links)
- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers (Q2942832) (← links)
- Bicliques with Minimal Data and Time Complexity for AES (Q2942833) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 (Q2946449) (← links)
- Security Analysis of PRINCE (Q2946873) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES (Q2946895) (← links)
- A Framework for Automated Independent-Biclique Cryptanalysis (Q2946897) (← links)
- A Higher Order Key Partitioning Attack with Application to LBlock (Q2947084) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm (Q2958128) (← links)
- Biclique Attack of Block Cipher SKINNY (Q2980841) (← links)
- Distinguisher and Related-Key Attack on the Full AES-256 (Q3183567) (← links)
- Improving the Biclique Cryptanalysis of AES (Q3194588) (← links)
- Bad Directions in Cryptographic Hash Functions (Q3194624) (← links)
- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique (Q3454593) (← links)