Decomposing Linear Layers. | 0 | 0.34 | 2022 |
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n. | 0 | 0.34 | 2021 |
A Short Note on a Weight Probability Distribution Related to SPNs. | 0 | 0.34 | 2019 |
The Exchange Attack: How to Distinguish 6 Rounds of AES with 2 chosen plaintexts. | 0 | 0.34 | 2019 |
Practical Attacks on Reduced-Round AES. | 0 | 0.34 | 2019 |
A New Structural-Differential Property of 5-Round AES. | 4 | 0.42 | 2017 |
Yoyo Tricks with AES. | 1 | 0.36 | 2017 |
Invariant subspaces in Simpira. | 0 | 0.34 | 2016 |
Subspace Trail Cryptanalysis And Its Applications To Aes | 7 | 0.50 | 2016 |
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers. | 0 | 0.34 | 2015 |
Simplifying algebraic attacks with univariate analysis. | 3 | 0.41 | 2011 |
Nonlinear Equivalence of Stream Ciphers | 7 | 1.01 | 2010 |
On the Number of Linearly Independent Equations Generated by XL | 1 | 0.36 | 2008 |
Attacking the Filter Generator over GF(2m) | 6 | 0.59 | 2007 |
The linear vector space spanned by the nonlinear filter generator | 3 | 0.47 | 2007 |
A survey of recent attacks on the filter generator | 2 | 0.39 | 2007 |
On attacks on filtering generators using linear subspace structures | 8 | 0.56 | 2007 |