QCB - Efficient Quantum-Secure Authenticated Encryption. | 0 | 0.34 | 2021 |
Quantum Linearization Attacks. | 0 | 0.34 | 2021 |
Generic Framework for Key-Guessing Improvements. | 0 | 0.34 | 2021 |
Improved Attacks On Sliscp Permutation And Tight Bound Of Limited Birthday Distinguishers | 0 | 0.34 | 2020 |
Saturnin: A Suite Of Lightweight Symmetric Algorithms For Post-Quantum Security | 0 | 0.34 | 2020 |
Cryptanalysis Results on Spook. | 0 | 0.34 | 2020 |
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. | 0 | 0.34 | 2020 |
Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light. | 0 | 0.34 | 2020 |
Optimal Merging in Quantum k-xor and k-sum Algorithms. | 0 | 0.34 | 2019 |
Preface To Volume 2018, Issue 1 | 0 | 0.34 | 2019 |
Quantum Security Analysis Of Aes | 0 | 0.34 | 2019 |
Hidden Shift Quantum Cryptanalysis and Implications. | 1 | 0.37 | 2018 |
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. | 8 | 0.54 | 2018 |
Making the Impossible Possible | 1 | 0.36 | 2018 |
State-Recovery Attacks On Modified Ketje Jr | 0 | 0.34 | 2018 |
Quantum Algorithms for the k -xor Problem. | 0 | 0.34 | 2018 |
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography. | 7 | 0.47 | 2017 |
Breaking Symmetric Cryptosystems using Quantum Period Finding. | 23 | 0.94 | 2016 |
Improved Cryptanalysis of AES-like Permutations | 4 | 0.40 | 2015 |
Quantum Differential And Linear Cryptanalysis | 11 | 0.61 | 2015 |
How to Compress Homomorphic Ciphertexts. | 0 | 0.34 | 2015 |
Related-Key Attack on Full-Round PICARO. | 2 | 0.42 | 2015 |
Cryptanalysis of Full Sprout. | 17 | 0.92 | 2015 |
Multiple Differential Cryptanalysis of Round-Reduced PRINCE. | 7 | 0.51 | 2014 |
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version). | 3 | 0.43 | 2014 |
Cryptanalysis of KLEIN. | 0 | 0.34 | 2014 |
Improved Impossible Differential Attacks against Round-Reduced LBlock. | 10 | 0.52 | 2014 |
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon. | 38 | 1.37 | 2014 |
Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version). | 0 | 0.34 | 2014 |
Cryptanalysis of KLEIN (Full version). | 0 | 0.34 | 2014 |
Multiple Limited-Birthday Distinguishers and Applications. | 10 | 0.53 | 2013 |
Sieve-in-the-Middle: Improved MITM Attacks (Full Version). | 0 | 0.34 | 2013 |
Sieve-in-the-Middle: Improved MITM Attacks. | 22 | 0.87 | 2013 |
A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions. | 2 | 0.37 | 2012 |
Practical cryptanalysis of ARMADILL02 | 2 | 0.40 | 2012 |
Correlation attacks on combination generators | 1 | 0.35 | 2012 |
Improved rebound attack on the finalist grøstl | 23 | 0.78 | 2012 |
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock | 19 | 0.97 | 2012 |
Conditional differential cryptanalysis of trivium and KATAN | 19 | 0.82 | 2011 |
Practical attack on 8 rounds of the lightweight block cipher KLEIN | 10 | 0.65 | 2011 |
How to improve rebound attacks | 28 | 1.45 | 2011 |
Practical analysis of reduced-round keccak | 26 | 1.64 | 2011 |
Rebound attack on JH42 | 5 | 0.62 | 2011 |
Improved analysis of ECHO-256 | 8 | 0.52 | 2011 |
Analysis of reduced-SHAvite-3-256 v2 | 3 | 0.40 | 2011 |
Cryptanalysis of ARMADILLO2 | 7 | 0.78 | 2011 |
QUARK: a lightweight hash | 1 | 0.36 | 2010 |
Cryptanalysis of the 10-round hash and full compression function of SHAvite-3-512 | 6 | 0.47 | 2010 |
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems | 49 | 1.96 | 2010 |
Cryptanalysis of Luffa v2 components | 12 | 0.95 | 2010 |