Improved Differential-Linear Attacks with Applications to ARX Ciphers | 0 | 0.34 | 2022 |
Trims and extensions of quadratic APN functions | 0 | 0.34 | 2022 |
Mathematical Aspects of Division Property. | 0 | 0.34 | 2022 |
A Cautionary Note on Protecting Xilinx’ UltraScale(+) Bitstream Encryption and Authentication Engine | 0 | 0.34 | 2022 |
Weak Tweak-Keys for the CRAFT Block Cipher | 0 | 0.34 | 2022 |
Decomposing Linear Layers. | 0 | 0.34 | 2022 |
A further study of quadratic APN permutations in dimension nine | 0 | 0.34 | 2022 |
Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications. | 0 | 0.34 | 2022 |
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization. | 0 | 0.34 | 2022 |
Strong and Tight Security Guarantees Against Integral Distinguishers. | 0 | 0.34 | 2021 |
Linearly Self-Equivalent APN Permutations in Small Dimension | 3 | 0.41 | 2021 |
Strong and Tight Security Guarantees against Integral Distinguishers. | 0 | 0.34 | 2021 |
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures. | 2 | 0.44 | 2021 |
Modeling For Three-Subset Division Property Without Unknown Subset | 0 | 0.34 | 2021 |
4-Uniform Permutations With Null Nonlinearity | 0 | 0.34 | 2020 |
Skinny-Aead And Skinny-Hash | 0 | 0.34 | 2020 |
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption With A Masked Tweakable Block Cipher | 0 | 0.34 | 2020 |
Dasta - Alternative Linear Layer For Rasta | 0 | 0.34 | 2020 |
Weak-Key Distinguishers for AES | 0 | 0.34 | 2020 |
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. | 0 | 0.34 | 2020 |
Craft: Lightweight Tweakable Block Cipher With Efficient Protection Against Dfa Attacks | 0 | 0.34 | 2019 |
Weak-Key Subspace Trails and Applications to AES. | 0 | 0.34 | 2019 |
Zero-Correlation Attacks On Tweakable Block Ciphers With Linear Tweakey Expansion | 0 | 0.34 | 2019 |
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. | 0 | 0.34 | 2019 |
Nonlinear Approximations In Cryptanalysis Revisited | 0 | 0.34 | 2018 |
Shiftrows Alternatives For Aes-Like Ciphers And Optimal Cell Permutations For Midori And Skinny | 0 | 0.34 | 2018 |
BISON - Instantiating the Whitened Swap-Or-Not Construction. | 0 | 0.34 | 2018 |
Rasta: A cipher with low ANDdepth and few ANDs per bit. | 3 | 0.42 | 2018 |
Nonlinear diffusion layers. | 0 | 0.34 | 2018 |
Searching For Subspace Trails And Truncated Differentials | 0 | 0.34 | 2018 |
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. | 0 | 0.34 | 2017 |
Shorter Linear Straight-Line Programs for MDS Matrices. | 2 | 0.37 | 2017 |
Proving Resistance against Invariant Attacks: How to Choose the Round Constants. | 2 | 0.43 | 2017 |
Strong 8-bit Sboxes with efficient masking in hardware extended version. | 1 | 0.37 | 2017 |
Grover Meets Simon - Quantumly Attacking the FX-construction. | 5 | 0.42 | 2017 |
Reflection ciphers. | 0 | 0.34 | 2017 |
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods | 1 | 0.36 | 2016 |
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. | 3 | 0.41 | 2016 |
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. | 40 | 1.34 | 2016 |
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. | 1 | 0.36 | 2016 |
Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes | 2 | 0.39 | 2015 |
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. | 13 | 0.82 | 2015 |
Observations on the SIMON block cipher family. | 31 | 1.18 | 2015 |
Decomposing the ASASA Block Cipher Construction. | 7 | 0.45 | 2015 |
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. | 3 | 0.39 | 2015 |
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. | 3 | 0.39 | 2015 |
Differential-Linear Cryptanalysis Revisited. | 5 | 0.55 | 2014 |
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version. | 1 | 0.38 | 2014 |
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). | 43 | 1.53 | 2014 |
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version. | 1 | 0.35 | 2013 |