Pages that link to "Item:Q3452356"
From MaRDI portal
The following pages link to How to Protect DES Against Exhaustive Key Search (Q3452356):
Displaying 18 items.
- Hidden shift quantum cryptanalysis and implications (Q1633473) (← links)
- Attacks on beyond-birthday-bound MACs in the quantum setting (Q2118560) (← links)
- Beyond quadratic speedups in quantum attacks on symmetric schemes (Q2170092) (← links)
- Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 (Q2179408) (← links)
- Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem (Q2188960) (← links)
- Reflection cryptanalysis of PRINCE-like ciphers (Q2516533) (← links)
- Quantum key-length extension (Q2695632) (← links)
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Q2829213) (← links)
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security (Q2835581) (← links)
- Side-Channel Analysis Protection and Low-Latency in Action (Q2958135) (← links)
- Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE (Q3179493) (← links)
- Building Secure Block Ciphers on Generic Attacks Assumptions (Q3644193) (← links)
- (Q4342474) (← links)
- Attacking Triple Encryption (Q4639452) (← links)
- Collision Resistant Double-Length Hashing (Q4933214) (← links)
- Pseudorandom Functions: Three Decades Later (Q5021131) (← links)
- Post-quantum security on the Lai-Massey scheme (Q6109706) (← links)
- Quantum attacks on Lai-Massey structure (Q6166984) (← links)