Pages that link to "Item:Q3650682"
From MaRDI portal
The following pages link to The Key-Dependent Attack on Block Ciphers (Q3650682):
Displaying 16 items.
- A simple power analysis attack against the key schedule of the Camellia block cipher (Q1041799) (← links)
- Blockwise \(p\)-tampering attacks on cryptographic primitives, extractors, and learners (Q1690272) (← links)
- New attacks on IDEA with at least 6 rounds (Q2344046) (← links)
- Differential entropy analysis of the IDEA block cipher (Q2349636) (← links)
- Improved Attacks on Reduced-Round Camellia-128/192/256 (Q2790031) (← links)
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher (Q2889869) (← links)
- Cryptanalysis of WIDEA (Q2946870) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers (Q2946905) (← links)
- A Statistical Saturation Attack against the Block Cipher PRESENT (Q3623045) (← links)
- (Q3623449) (← links)
- Building Secure Block Ciphers on Generic Attacks Assumptions (Q3644193) (← links)
- (Q4474174) (← links)
- Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher (Q4922888) (← links)
- On the Role of Key Schedules in Attacks on Iterated Ciphers (Q5862314) (← links)
- Topics in Cryptology – CT-RSA 2006 (Q5898571) (← links)