Integral Cryptanalysis of Lightweight Block Cipher PIPO. | 0 | 0.34 | 2022 |
PIPO - A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. | 0 | 0.34 | 2020 |
New Approach To Constructing Noise Source Based On Race Conditions | 0 | 0.34 | 2019 |
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers. | 0 | 0.34 | 2017 |
Known-Key Attack On Sm4 Block Cipher | 0 | 0.34 | 2017 |
New Impossible Differential Characteristic of SPECK64 using MILP. | 0 | 0.34 | 2016 |
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks | 1 | 0.37 | 2015 |
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. | 3 | 0.41 | 2015 |
Related-Key Cryptanalysis On The Full Printcipher Suitable For Ic-Printing | 3 | 0.44 | 2014 |
Security Analysis Of Scalable Block Cipher Pp-1 Applicable To Distributed Sensor Networks | 0 | 0.34 | 2013 |
Improved Differential Fault Analysis on ARIA using Small Number of Faults. | 0 | 0.34 | 2013 |
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. | 5 | 0.47 | 2013 |
Security Analysis of HMAC/NMAC by Using Fault Injection. | 1 | 0.37 | 2013 |
Improved differential fault analysis on PRESENT-80/128 | 4 | 0.43 | 2013 |
Known-Key Attacks On Generalized Feistel Schemes With Sp Round Function | 2 | 0.40 | 2012 |
Differential fault analysis on block cipher SEED | 14 | 0.79 | 2012 |
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED. | 7 | 0.53 | 2012 |
Notions and relations for RKA-secure permutation and function families | 0 | 0.34 | 2011 |
Fault Injection Attack on A5/3 | 1 | 0.36 | 2011 |
Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems. | 0 | 0.34 | 2011 |
Differential cryptanalysis of eight-round SEED | 2 | 0.37 | 2011 |
Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems | 3 | 0.37 | 2010 |
A note on "Improved Fast Correlation Attacks on Stream Ciphers". | 0 | 0.34 | 2010 |
A New Double-Block-Length Hash Function Using Feistel Structure | 6 | 0.46 | 2009 |
Update on SEED: SEED-192/256 | 0 | 0.34 | 2009 |
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension. | 0 | 0.34 | 2008 |
Security analysis of the full-round DDO-64 block cipher | 6 | 0.68 | 2008 |
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 | 28 | 1.66 | 2008 |
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis | 4 | 0.42 | 2008 |
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks | 12 | 0.80 | 2008 |
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function | 0 | 0.34 | 2008 |
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths. | 2 | 0.40 | 2008 |
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions. | 2 | 0.38 | 2008 |
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher. | 11 | 1.05 | 2008 |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL | 12 | 0.65 | 2008 |
New FORK-256. | 0 | 0.34 | 2007 |
Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128 | 3 | 0.41 | 2007 |
Preimage attack on the parallel FFT-hashing function | 0 | 0.34 | 2007 |
Cryptanalysis of an involutional block cipher using cellular automata | 1 | 0.36 | 2007 |
Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis | 6 | 0.75 | 2006 |
Improved fast correlation attack on the shrinking and self-shrinking generators | 0 | 0.34 | 2006 |
HIGHT: a new block cipher suitable for low-resource device | 213 | 11.31 | 2006 |
A new dedicated 256-bit hash function: FORK-256 | 15 | 0.98 | 2006 |
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers | 0 | 0.34 | 2006 |
Forgery and key recovery attacks on PMAC and mitchell's TMAC variant | 4 | 0.45 | 2006 |
Related-key and meet-in-the-middle attacks on Triple-DES and DES-EXE | 4 | 0.44 | 2005 |
Related-Key differential attacks on cobra-h64 and cobra-h128 | 10 | 0.63 | 2005 |
How to construct universal one-way hash functions of order r | 1 | 0.34 | 2005 |
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds | 1 | 0.35 | 2005 |
Related-Key differential attacks on cobra-s128, cobra-f64a, and cobra-f64b | 11 | 0.69 | 2005 |