Integral Cryptanalysis of WARP based on Monomial Prediction | 0 | 0.34 | 2022 |
Information-Combining Differential Fault Attacks on DEFAULT | 0 | 0.34 | 2022 |
Throwing Boomerangs into Feistel Structures Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE | 0 | 0.34 | 2022 |
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis | 0 | 0.34 | 2022 |
Ascon V1.2: Lightweight Authenticated Encryption And Hashing | 2 | 0.67 | 2021 |
L∗-based learning of Markov decision processes (extended version) | 0 | 0.34 | 2021 |
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. | 0 | 0.34 | 2020 |
Protecting against Statistical Ineffective Fault Attacks. | 0 | 0.34 | 2020 |
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. | 0 | 0.34 | 2020 |
Analyzing The Linear Keystream Biases In Aegis | 0 | 0.34 | 2019 |
Protecting against Statistical Ineffective Fault Attacks. | 0 | 0.34 | 2019 |
Analyzing the Linear Keystream Biases in AEGIS. | 0 | 0.34 | 2019 |
Forgery Attacks on FlexAE and FlexAEAD. | 0 | 0.34 | 2019 |
Clustering Related-Tweak Characteristics: Application To Mantis-6 | 3 | 0.41 | 2018 |
Exploiting Ineffective Fault Inductions on Symmetric Cryptography. | 0 | 0.34 | 2018 |
Cryptanalysis of MORUS. | 0 | 0.34 | 2018 |
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. | 0 | 0.34 | 2018 |
Rasta: A cipher with low ANDdepth and few ANDs per bit. | 3 | 0.42 | 2018 |
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. | 1 | 0.35 | 2018 |
Algebraic Cryptanalysis of Frit. | 0 | 0.34 | 2018 |
Note on the Robustness of CAESAR Candidates. | 0 | 0.34 | 2017 |
Isap - Towards Side-Channel Secure Authenticated Encryption | 0 | 0.34 | 2017 |
Practical Fault Attacks on Authenticated Encryption Modes for AES. | 0 | 0.34 | 2016 |
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. | 7 | 0.50 | 2016 |
ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks. | 1 | 0.35 | 2016 |
Key Recovery for MANTIS-5. | 0 | 0.34 | 2016 |
Square Attack on 7-Round Kiasu-BC. | 2 | 0.57 | 2016 |
Analysis of SHA-512/224 and SHA-512/256. | 1 | 0.63 | 2016 |
Cryptanalysis of Simpira v1. | 0 | 0.34 | 2016 |
Cryptanalysis of Simpira. | 0 | 0.34 | 2016 |
Analysis of the Kupyna-256 Hash Function. | 1 | 0.37 | 2016 |
Practical Key-Recovery Attack On Mantis(5) | 0 | 0.34 | 2016 |
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. | 2 | 0.40 | 2015 |
Higher-Order Cryptanalysis of LowMC. | 0 | 0.34 | 2015 |
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates | 7 | 0.46 | 2015 |
Forgery Attacks on round-reduced ICEPOLE-128. | 0 | 0.34 | 2015 |
Related-Key Forgeries for Prøst-OTR. | 4 | 0.44 | 2015 |
Cryptanalysis of Ascon. | 0 | 0.34 | 2015 |
Branching Heuristics in Differential Collision Search with Applications to SHA-512. | 4 | 0.41 | 2014 |
Key Recovery Attacks On Recent Authenticated Ciphers | 1 | 0.36 | 2014 |
Malicious Hashing: Eve's Variant of SHA-1. | 7 | 0.84 | 2014 |