Multivariate Profiling Of Hulls For Linear Cryptanalysis | 0 | 0.34 | 2018 |
When Intrusion Detection Meets Blockchain Technology: A Review. | 45 | 1.00 | 2018 |
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness. | 6 | 0.48 | 2016 |
A MAC Mode for Lightweight Block Ciphers. | 9 | 0.55 | 2016 |
Multivariate Linear Cryptanalysis: The Past and Future of PRESENT. | 1 | 0.36 | 2016 |
Comb to Pipeline: Fast Software Encryption Revisited | 5 | 0.49 | 2015 |
Twisted Polynomials and Forgery Attacks on GCM. | 7 | 0.43 | 2015 |
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks. | 0 | 0.34 | 2015 |
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis. | 1 | 0.38 | 2014 |
Weak-Key Analysis of POET. | 2 | 0.38 | 2014 |
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software. | 6 | 0.58 | 2014 |
Internal differential collision attacks on the reduced-round GrØstl-0 hash function | 0 | 0.34 | 2014 |
Key Recovery Attacks On Recent Authenticated Ciphers | 1 | 0.36 | 2014 |
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. | 13 | 0.66 | 2013 |
ALE: AES-Based Lightweight Authenticated Encryption. | 31 | 1.33 | 2013 |
Parallelizable and Authenticated Online Ciphers | 51 | 1.32 | 2013 |
Key-Alternating ciphers in a provable setting: encryption using a small number of public permutations | 54 | 1.60 | 2012 |
A Simple Key-Recovery Attack on McOE-X. | 6 | 0.51 | 2012 |
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). | 31 | 1.02 | 2012 |
A model for structure attacks, with applications to PRESENT and serpent | 12 | 0.63 | 2012 |
Nonsmooth Cryptanalysis, With An Application To The Stream Cipher Mickey | 2 | 0.49 | 2011 |
On the limits of privacy in reputation systems | 1 | 0.35 | 2011 |
Whirlwind: a new cryptographic hash function | 7 | 0.51 | 2010 |
Improved collision attacks on the reduced-round Grøstl hash function | 6 | 0.47 | 2010 |
The Lane hash function. | 18 | 1.35 | 2009 |