Analysis of the CAESAR Candidate Silver
From MaRDI portal
Publication:2807229
DOI10.1007/978-3-319-31301-6_28zbMath1396.94085OpenAlexW2466016796MaRDI QIDQ2807229
Yu Sasaki, Jérémy Jean, Lei Wang
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_28
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- The Software Performance of Authenticated-Encryption Modes
- Improved Differential Attacks for ECHO and Grøstl
- The block cipher Square
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- A Classical Introduction to Cryptography
This page was built for publication: Analysis of the CAESAR Candidate Silver