Mind the middle layer: the HADES design strategy revisited
From MaRDI portal
Publication:2056722
DOI10.1007/978-3-030-77886-6_2zbMath1479.94199OpenAlexW3013174546MaRDI QIDQ2056722
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-77886-6_2
Related Items (3)
Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Provable security of HADES structure ⋮ \textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function
Cites Work
- Unnamed Item
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
- On a generalization of substitution-permutation networks: the HADES design strategy
- Optimized Interpolation Attacks on LowMC
- Higher-Order Cryptanalysis of LowMC
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- Ciphers for MPC and FHE
- On MDS codes via Cauchy matrices
This page was built for publication: Mind the middle layer: the HADES design strategy revisited