Pages that link to "Item:Q2851426"
From MaRDI portal
The following pages link to Block Ciphers That Are Easier to Mask: How Far Can We Go? (Q2851426):
Displaying 34 items.
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties (Q269570) (← links)
- Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305) (← links)
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- A new non-random property of 4.5-round PRINCE (Q831652) (← links)
- Generalized MitM attacks on full TWINE (Q894457) (← links)
- New slide attacks on almost self-similar ciphers (Q2055611) (← links)
- Mind the middle layer: the HADES design strategy revisited (Q2056722) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle (Q2096492) (← links)
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers (Q2102066) (← links)
- On a generalization of substitution-permutation networks: the HADES design strategy (Q2119029) (← links)
- Cryptanalysis of full LowMC and LowMC-M with algebraic techniques (Q2129003) (← links)
- Counting active S-boxes is not enough (Q2152037) (← links)
- Improved filter permutators for efficient FHE: better instances and implementations (Q2179380) (← links)
- A practical forgery attack on Lilliput-AE (Q2188961) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- Related-Key Attack on Full-Round PICARO (Q2807197) (← links)
- Cryptanalysis of Feistel Networks with Secret Round Functions (Q2807198) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks (Q2829214) (← links)
- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask (Q2947070) (← links)
- A Higher Order Key Partitioning Attack with Application to LBlock (Q2947084) (← links)
- New classes of $8$-bit permutations based on a butterfly structure (Q3383078) (← links)
- Построение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций (Q3383126) (← links)
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure (Q3457107) (← links)
- A MAC Mode for Lightweight Block Ciphers (Q4639470) (← links)
- Constructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parameters (Q5071475) (← links)
- Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам (Q5152388) (← links)
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities (Q5918865) (← links)
- A further study on bridge structures and constructing bijective S-boxes for low-latency masking (Q6063138) (← links)
- Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes (Q6632061) (← links)