spongent
From MaRDI portal
Software:20454
No author found.
Related Items (27)
Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications ⋮ Improved Integral Attack on Generalized Feistel Cipher ⋮ Thinking outside the superbox ⋮ BBB Secure Nonce Based MAC Using Public Permutations ⋮ Quark: a lightweight hash ⋮ Optimizing Online Permutation-Based AE Schemes for Lightweight Applications ⋮ Post-quantum security of the sponge construction ⋮ A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis ⋮ Differential property of \textsc{Present}-like structure ⋮ Cryptanalysis of KLEIN ⋮ \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations ⋮ Implementing Lightweight Block Ciphers on x86 Architectures ⋮ Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures ⋮ Adaptively code-correlation robustness functions and its applications to private set intersection ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ Quantum attacks against BBB secure PRFs or MACs built from public random permutations ⋮ GIFT: A Small Present ⋮ Bitsliced Masking and ARM: Friends or Foes? ⋮ Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC ⋮ Breaking LWC candidates: sESTATE and Elephant in quantum setting ⋮ Tornado: automatic generation of probing-secure masked bitsliced implementations ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN ⋮ Multi-user BBB security of public permutations based MAC ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes ⋮ Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme ⋮ SPONGENT: The Design Space of Lightweight Cryptographic Hashing
This page was built for software: spongent