Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
spongent - MaRDI portal

spongent

From MaRDI portal
Software:20454



swMATH8445MaRDI QIDQ20454


No author found.





Related Items (27)

Duplexing the Sponge: Single-Pass Authenticated Encryption and Other ApplicationsImproved Integral Attack on Generalized Feistel CipherThinking outside the superboxBBB Secure Nonce Based MAC Using Public PermutationsQuark: a lightweight hashOptimizing Online Permutation-Based AE Schemes for Lightweight ApplicationsPost-quantum security of the sponge constructionA greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysisDifferential property of \textsc{Present}-like structureCryptanalysis of KLEIN\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutationsImplementing Lightweight Block Ciphers on x86 ArchitecturesFull analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasuresAdaptively code-correlation robustness functions and its applications to private set intersectionSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionQuantum attacks against BBB secure PRFs or MACs built from public random permutationsGIFT: A Small PresentBitsliced Masking and ARM: Friends or Foes?Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBCBreaking LWC candidates: sESTATE and Elephant in quantum settingTornado: automatic generation of probing-secure masked bitsliced implementationsBeyond conventional security in sponge-based authenticated encryption modesPractical Attack on 8 Rounds of the Lightweight Block Cipher KLEINMulti-user BBB security of public permutations based MACA Search Strategy to Optimize the Affine Variant Properties of S-BoxesSufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption SchemeSPONGENT: The Design Space of Lightweight Cryptographic Hashing


This page was built for software: spongent