Pages that link to "Item:Q3577971"
From MaRDI portal
The following pages link to Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations (Q3577971):
Displaying 50 items.
- Cryptanalysis of full \texttt{RIPEMD-128} (Q321321) (← links)
- Cryptanalysis of GOST R hash function (Q402352) (← links)
- Improved cryptanalysis of AES-like permutations (Q484330) (← links)
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- Revisiting Gilbert's known-key distinguisher (Q780379) (← links)
- Weak-key distinguishers for AES (Q832335) (← links)
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes (Q893871) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes (Q1726666) (← links)
- Statistical integral distinguisher with multi-structure and its application on AES-like ciphers (Q1749792) (← links)
- On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers (Q1944937) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} (Q2051403) (← links)
- New representations of the AES key schedule (Q2056670) (← links)
- The MALICIOUS framework: embedding backdoors into tweakable block ciphers (Q2102066) (← links)
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light (Q2102070) (← links)
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound (Q2119014) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- Distinguisher on full-round compression function of GOST R (Q2294437) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function (Q2439730) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- Quantum collision attacks on AES-like hashing with low quantum random access memories (Q2692403) (← links)
- Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure (Q2807222) (← links)
- Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ (Q2817820) (← links)
- Wide Trail Design Strategy for Binary MixColumns (Q2822689) (← links)
- Improved Analysis of ECHO-256 (Q2889861) (← links)
- <i>Nimix:</i>An involutary nonlinear vectorial boolean function (Q2892109) (← links)
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ (Q2946874) (← links)
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function (Q2958116) (← links)
- Analysis of Reduced-SHAvite-3-256 v2 (Q3013078) (← links)
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function (Q3013080) (← links)
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool (Q3013095) (← links)
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes (Q3013096) (← links)
- Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags (Q3084249) (← links)
- Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function (Q3084267) (← links)
- Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity (Q3098004) (← links)
- Boomerang Distinguisher for the SIMD-512 Compression Function (Q3104738) (← links)
- Related-Key Cryptanalysis of Midori (Q3179490) (← links)
- Cryptanalysis of Reduced-Round Whirlwind (Q3194587) (← links)
- LHash: A Lightweight Hash Function (Q3454161) (← links)
- Cryptanalysis of the Round-Reduced GOST Hash Function (Q3454162) (← links)
- Practical Free-Start Collision Attacks on 76-step SHA-1 (Q3457131) (← links)
- Strengthening the Known-Key Security Notion for Block Ciphers (Q4639495) (← links)
- Analysis of the Kupyna-256 Hash Function (Q4639499) (← links)
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES (Q5151046) (← links)
- Improved attacks against reduced-round Whirlwind (Q6063133) (← links)
- Triangulating rebound attack on AES-like hashing (Q6097258) (← links)
- Quantum impossible differential attacks: applications to AES and SKINNY (Q6130615) (← links)
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher (Q6489784) (← links)