Serpent
From MaRDI portal
Software:33786
No author found.
Related Items (54)
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions ⋮ A note on APN permutations in even dimension ⋮ Cryptographic Analysis of All 4 × 4-Bit S-Boxes ⋮ Improved Integral Attack on Generalized Feistel Cipher ⋮ Differential-linear cryptanalysis from an algebraic perspective ⋮ On hidden sums compatible with a given block cipher diffusion layer ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ On some block ciphers and imprimitive groups ⋮ The design of composite permutations with applications to DES-like S-boxes ⋮ New attacks from old distinguishers improved attacks on serpent ⋮ Primitivity of PRESENT and other lightweight ciphers ⋮ New statistical randomness tests based on length of runs ⋮ Unnamed Item ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Structural cryptanalysis of SASAS ⋮ Differential-linear cryptanalysis revisited ⋮ Type-preserving matrices and security of block ciphers ⋮ Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers ⋮ Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\) ⋮ On weakly APN functions and 4-bit S-boxes ⋮ On the multiplicative complexity of Boolean functions and bitsliced higher-order masking ⋮ GIFT: A Small Present ⋮ On the group generated by the round functions of translation based ciphers over arbitrary finite fields ⋮ Multidimensional linear cryptanalysis ⋮ The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions ⋮ Wave-shaped round functions and primitive groups ⋮ Differential attacks: using alternative operations ⋮ Finding the differential characteristics of block ciphers with neural networks ⋮ Parallel algorithms development for programmable devices with application from cryptography ⋮ Modeling energy-efficient secure communications in multi-mode wireless mobile devices ⋮ Serpent: A New Block Cipher Proposal ⋮ An algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomial ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ Comparative performance of the classifiers for cryptosystem identification ⋮ On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion ⋮ Differential Fault Analysis of Sosemanuk ⋮ Cryptanalysis of Hummingbird-1 ⋮ Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited ⋮ Efficient cache attacks on AES, and countermeasures ⋮ Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks ⋮ Designing against a class of algebraic attacks on symmetric block ciphers ⋮ A note on some algebraic trapdoors for block ciphers ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion ⋮ Cryptographic properties of small bijective S-boxes with respect to modular addition ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ A Statistical Saturation Attack against the Block Cipher PRESENT ⋮ Pen and Paper Arguments for SIMON and SIMON-like Designs ⋮ Cryptanalysis of a Generic Class of White-Box Implementations ⋮ New criteria for linear maps in AES-like ciphers ⋮ Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices ⋮ A Differential-Linear Attack on 12-Round Serpent ⋮ Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes ⋮ Improbable differential attacks on \texttt{PRESENT} using undisturbed bits
This page was built for software: Serpent