Integral Cryptanalysis of Lightweight Block Cipher PIPO. | 0 | 0.34 | 2022 |
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting. | 0 | 0.34 | 2022 |
Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings | 0 | 0.34 | 2021 |
PIPO - A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. | 0 | 0.34 | 2020 |
Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function | 0 | 0.34 | 2020 |
Improving Mdc-4 To Be More Secure | 0 | 0.34 | 2019 |
New Approach To Constructing Noise Source Based On Race Conditions | 0 | 0.34 | 2019 |
Differential property of Present-like structure. | 0 | 0.34 | 2018 |
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers. | 0 | 0.34 | 2017 |
Known-Key Attack On Sm4 Block Cipher | 0 | 0.34 | 2017 |
Improved preimage attacks on hash modes of 8-round AES-256 | 3 | 0.39 | 2016 |
New Impossible Differential Characteristic of SPECK64 using MILP. | 0 | 0.34 | 2016 |
LSH: A New Fast Secure Hash Function Family. | 5 | 0.49 | 2014 |
Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH. | 0 | 0.34 | 2014 |
Cryptanalysis Of Double-Block-Length Hash Modes Mdc-4 And Mjh | 1 | 0.34 | 2014 |
Higher order eTCR hash functions. | 0 | 0.34 | 2013 |
Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key. | 1 | 0.34 | 2013 |
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors | 24 | 1.34 | 2013 |
Cryptanalysis of Double-Block-Length Hash Mode MJH. | 1 | 0.35 | 2012 |
Improved known-key distinguishers on Feistel-SP ciphers and application to camellia | 8 | 0.47 | 2012 |
Preimage And Second-Preimage Attacks On Pgv Hashing Modes Of Round-Reduced Aria, Camellia, And Serpent | 2 | 0.37 | 2012 |
Known-Key Attacks On Generalized Feistel Schemes With Sp Round Function | 2 | 0.40 | 2012 |
Meet-In-The-Middle Preimage Attacks On Hash Modes Of Generalized Feistel And Misty Schemes With Sp Round Function | 2 | 0.37 | 2012 |
New Preimage Attacks on Hash Modes of AES-256. | 0 | 0.34 | 2012 |
New Preimage Attack on MDC-4. | 1 | 0.35 | 2012 |
Collision Resistance of the JH Hash Function | 8 | 0.42 | 2011 |
Biclique attack on the full HIGHT | 26 | 1.20 | 2011 |
Related-key attack on the full HIGHT | 10 | 0.78 | 2010 |
Preimage attacks on reduced steps of ARIRANG and PKC98-hash | 3 | 0.41 | 2009 |
Preimage Attack on ARIRANG. | 6 | 0.57 | 2009 |
Improved preimage attack for 68-step HAS-160 | 12 | 0.55 | 2009 |
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks | 12 | 0.80 | 2008 |
New FORK-256. | 0 | 0.34 | 2007 |
Cryptanalysis of an involutional block cipher using cellular automata | 1 | 0.36 | 2007 |
Improved fast correlation attack on the shrinking and self-shrinking generators | 0 | 0.34 | 2006 |
HIGHT: a new block cipher suitable for low-resource device | 213 | 11.31 | 2006 |
A new dedicated 256-bit hash function: FORK-256 | 15 | 0.98 | 2006 |
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers | 0 | 0.34 | 2006 |
A weak key class of XTEA for a related-key rectangle attack | 6 | 0.58 | 2006 |
Linear Attack Using Multiple Linear Approximations | 1 | 0.63 | 2005 |
How to construct universal one-way hash functions of order r | 1 | 0.34 | 2005 |
Linear Attack Using Multiple Linear Approximations. | 0 | 0.34 | 2005 |
On The Linear Complexity Of Some Generalized Cyclotomic Sequences | 8 | 0.97 | 2004 |
Higher Order Universal One-Way Hash Functions | 10 | 0.61 | 2004 |
Key recovery attacks on the RMAC, TMAC, and IACBC | 3 | 0.42 | 2003 |
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 | 16 | 1.07 | 2002 |
Impossible Differential Cryptanalysis of Zodiac | 5 | 0.54 | 2001 |
Known-IV Attacks on Triple Modes of Operation of Block Ciphers | 4 | 0.56 | 2001 |