Pages that link to "Item:Q5199192"
From MaRDI portal
The following pages link to A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack (Q5199192):
Displaying 50 items.
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (Q269576) (← links)
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures (Q404952) (← links)
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock (Q456064) (← links)
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- Can a differential attack work for an arbitrarily large number of rounds? (Q831646) (← links)
- A new non-random property of 4.5-round PRINCE (Q831652) (← links)
- Weak-key distinguishers for AES (Q832335) (← links)
- New observations on invariant subspace attack (Q1653027) (← links)
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis (Q1726672) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Slender-set differential cryptanalysis (Q1946602) (← links)
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 (Q2010591) (← links)
- On invariant subspaces in the Lai-Massey scheme and a primitivity reduction (Q2050141) (← links)
- New slide attacks on almost self-similar ciphers (Q2055611) (← links)
- New representations of the AES key schedule (Q2056670) (← links)
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette} (Q2056713) (← links)
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) (Q2102073) (← links)
- Integral characteristics by keyspace partitioning (Q2115730) (← links)
- TNT: how to tweak a block cipher (Q2119027) (← links)
- On a generalization of substitution-permutation networks: the HADES design strategy (Q2119029) (← links)
- The phantom of differential characteristics (Q2205883) (← links)
- Subgroups of direct products of groups invariant under the action of permutations on factors (Q2209251) (← links)
- Troika: a ternary cryptographic hash function (Q2285779) (← links)
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation (Q2332893) (← links)
- Rotational differential-linear cryptanalysis revisited (Q2677646) (← links)
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher (Q2889869) (← links)
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials (Q2946880) (← links)
- A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox (Q2946898) (← links)
- Nonlinear Invariant Attack (Q2953771) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- Cryptanalysis of the Light-Weight Cipher A2U2 (Q3104709) (← links)
- Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere (Q3104729) (← links)
- Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE (Q3179493) (← links)
- Атака на $\mathrm{6}$ раундов Khazad (Q3381819) (← links)
- Влияние приводимости линейного преобразования на выбор раундовых констант (Q3381878) (← links)
- The permutation group insight on the diffusion property of linear mappings (Q3382018) (← links)
- Характеризация отображений через свойство неизометричности (Q3383095) (← links)
- Cryptanalysis of Full Sprout (Q3457133) (← links)
- PRINTcipher: A Block Cipher for IC-Printing (Q3583438) (← links)
- О классах слабых ключей обобщенной шифрсистемы PRINT (Q4959076) (← links)
- Constructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parameters (Q5071475) (← links)
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES (Q5151046) (← links)
- On the Multi-output Filtering Model and Its Applications (Q5739040) (← links)
- Block cipher invariants as eigenvectors of correlation matrices (Q5918867) (← links)
- On the primitivity of the AES-128 key-schedule (Q6090967) (← links)
- FUTURE: a lightweight block cipher using an optimal diffusion matrix (Q6103075) (← links)
- A theoretical analysis of generalized invariants of bijective S-boxes (Q6107450) (← links)
- Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers (Q6112007) (← links)