Ascon V1.2: Lightweight Authenticated Encryption And Hashing | 2 | 0.67 | 2021 |
Practical forgeries for ORANGE | 0 | 0.34 | 2020 |
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 | 0 | 0.34 | 2020 |
Protecting against Statistical Ineffective Fault Attacks. | 0 | 0.34 | 2020 |
Protecting against Statistical Ineffective Fault Attacks. | 0 | 0.34 | 2019 |
Preface To Volume 2018, Issue 1 | 0 | 0.34 | 2019 |
New Semi-Free-Start Collision Attack Framework For Reduced Ripemd-160 | 0 | 0.34 | 2019 |
Efficient Collision Attack Frameworks for RIPEMD-160 | 0 | 0.34 | 2018 |
Exploiting Ineffective Fault Inductions on Symmetric Cryptography. | 0 | 0.34 | 2018 |
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. | 0 | 0.34 | 2018 |
Rasta: A cipher with low ANDdepth and few ANDs per bit. | 3 | 0.42 | 2018 |
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. | 1 | 0.35 | 2018 |
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje. | 1 | 0.35 | 2018 |
Algebraic Cryptanalysis of Frit. | 0 | 0.34 | 2018 |
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. | 0 | 0.34 | 2017 |
Note on the Robustness of CAESAR Candidates. | 0 | 0.34 | 2017 |
Gimli: A Cross-Platform Permutation | 2 | 0.39 | 2017 |
Isap - Towards Side-Channel Secure Authenticated Encryption | 0 | 0.34 | 2017 |
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. | 4 | 0.58 | 2017 |
Haraka V2 - Efficient Short-Input Hashing For Post-Quantum Applications | 1 | 0.34 | 2016 |
Practical Fault Attacks on Authenticated Encryption Modes for AES. | 0 | 0.34 | 2016 |
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. | 7 | 0.50 | 2016 |
Cryptanalysis of Reduced NORX. | 0 | 0.34 | 2016 |
ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks. | 1 | 0.35 | 2016 |
Key Recovery for MANTIS-5. | 0 | 0.34 | 2016 |
Square Attack on 7-Round Kiasu-BC. | 2 | 0.57 | 2016 |
Analysis of SHA-512/224 and SHA-512/256. | 1 | 0.63 | 2016 |
Cryptanalysis of Simpira v1. | 0 | 0.34 | 2016 |
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications. | 4 | 0.40 | 2016 |
Cryptanalysis of Simpira. | 0 | 0.34 | 2016 |
Analysis of the Kupyna-256 Hash Function. | 1 | 0.37 | 2016 |
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. | 3 | 0.67 | 2016 |
Practical Key-Recovery Attack On Mantis(5) | 0 | 0.34 | 2016 |
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. | 2 | 0.40 | 2015 |
Higher-Order Cryptanalysis of LowMC. | 0 | 0.34 | 2015 |
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates | 7 | 0.46 | 2015 |
Forgery Attacks on round-reduced ICEPOLE-128. | 0 | 0.34 | 2015 |
Related-Key Forgeries for Prøst-OTR. | 4 | 0.44 | 2015 |
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. | 5 | 0.44 | 2015 |
Cryptanalysis of Ascon. | 0 | 0.34 | 2015 |
Differential Cryptanalysis of SipHash. | 2 | 0.40 | 2014 |
Collision Attack on 5 Rounds of Grøstl. | 7 | 0.47 | 2014 |
Branching Heuristics in Differential Collision Search with Applications to SHA-512. | 4 | 0.41 | 2014 |
Key Recovery Attacks On Recent Authenticated Ciphers | 1 | 0.36 | 2014 |
Malicious Hashing: Eve's Variant of SHA-1. | 7 | 0.84 | 2014 |
Collisions for the WIDEA-8 compression function | 1 | 0.36 | 2013 |
Finding collisions for round-reduced SM3 | 5 | 0.42 | 2013 |
Improved Cryptanalysis of Reduced RIPEMD-160. | 4 | 0.61 | 2013 |
Improving Local Collisions: New Attacks on Reduced SHA-256. | 17 | 0.67 | 2013 |
FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware | 26 | 0.95 | 2013 |