Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1394311 - MaRDI portal

scientific article; zbMATH DE number 1394311

From MaRDI portal
Publication:4934727

zbMath0951.94521MaRDI QIDQ4934727

Eli Biham

Publication date: 31 January 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (33)

Relations between robustness and RKA security under public-key encryptionAmplifying Side-Channel Attacks with Techniques from Block Cipher CryptanalysisKey-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESeSPF: A Family of Format-Preserving Encryption Algorithms Using MDS MatricesRelated-Key Cryptanalysis of MidoriSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsCUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskRelated-key attacks on the compression function of StreebogOn the related-key attack security of authenticated encryption schemesWhen messages are keys: is HMAC a dual-PRF?And Rijndael? Automatic related-key differential analysis of RijndaelContinuously non-malleable codes against bounded-depth tamperingImproved Differential Cryptanalysis of CAST-128 and CAST-256SPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsCryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006Higher Order Differential Attack of a CAST CipherRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsOn Cipher-Dependent Related-Key Attacks in the Ideal-Cipher ModelRelated-key security for pseudorandom functions beyond the linear barrierFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsNotions and relations for RKA-secure permutation and function familiesThe (related-key) impossible boomerang attack and its application to the AES block cipherThe Delicate Issues of Addition with Respect to XOR DifferencesComputing AES related-key differential characteristics with constraint programmingClever Arbiters Versus Malicious AdversariesRevisiting AES related-key differential attacks with constraint programmingX-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRsRelated-key secure key encapsulation from extended computational bilinear Diffie-HellmanRelated-key attack on 5-round Kuznyechik3D: A Three-Dimensional Block CipherAnalyzing the provable security bounds of GIFT-COFB and Photon-BeetleOn the Role of Key Schedules in Attacks on Iterated Ciphers




This page was built for publication: