• NIST Statistical Test Suite

  • Referenced in 55 articles [sw22972]
  • statistical testing and its relation to cryptanalysis is also discussed, and some recommended statistical tests ... testing cannot serve as a substitute for cryptanalysis. The design and cryptanalysis of generators...
  • LBlock

  • Referenced in 40 articles [sw06569]
  • margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis and related...
  • Square

  • Referenced in 51 articles [sw26286]
  • resistance against differential and linear cryptanalysis. However, after the initial design a dedicated attack...
  • Serpent

  • Referenced in 36 articles [sw21989]
  • existing experience of block cipher cryptanalysis. We also used twice as many rounds...
  • FOX

  • Referenced in 20 articles [sw13586]
  • immune to linear and differential cryptanalysis, and we discuss its security towards integral cryptanalysis, algebraic...
  • ChaCha

  • Referenced in 22 articles [sw07098]
  • diffusion per round, conjecturally increasing resistance to cryptanalysis, while preserving—and often improving—time...
  • MISTY

  • Referenced in 22 articles [sw24162]
  • provable security against differential and linear cryptanalysis, and moreover they realize high speed encryption...
  • Rumba20

  • Referenced in 12 articles [sw07099]
  • have been broken by differential cryptanalysis, while ChaCha has not been analyzed yet. We introduce ... novel method for differential cryptanalysis of Salsa20 and ChaCha, inspired by correlation attacks and related ... application of neutral bits in stream cipher cryptanalysis. It allows us to break...
  • LEX

  • Referenced in 19 articles [sw19585]
  • Cryptanalysis of the stream cipher LEX. Biryukov (The Design of a Stream Cipher LEX, Proceedings...
  • ICEBERG

  • Referenced in 18 articles [sw13243]
  • block ciphers. Resistance against side-channel cryptanalysis was also considered as a design criteria...
  • Rabbit

  • Referenced in 16 articles [sw08372]
  • particular, correlation analysis and algebraic investigations. The cryptanalysis of Rabbit did not reveal an attack...
  • SHARK

  • Referenced in 14 articles [sw21955]
  • cipher is resistant against differential and linear cryptanalysis after a small number of rounds...
  • ARXtools

  • Referenced in 9 articles [sw09727]
  • assess the security those functions against differential cryptanalysis. Our tools are publicly available from...
  • MicroEliece

  • Referenced in 8 articles [sw09835]
  • closely related, a major breakthrough in cryptanalysis tackling one of those problems could render...
  • EPCBC

  • Referenced in 4 articles [sw11640]
  • results on the differential and linear cryptanalysis bounds for the generalized PRESENT when the block ... analyze the resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack ... latest higher-order differential cryptanalysis from FSE 2011 [11]. Our proposed cipher would...
  • Whirlwind

  • Referenced in 3 articles [sw06748]
  • security against state-of-the-art cryptanalysis methods is also provided. In comparison ... competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance...
  • Janus

  • Referenced in 3 articles [sw18580]
  • framework for automated independent-biclique cryptanalysis. In this paper we introduce Janus, a software framework...
  • CryptoSMT

  • Referenced in 1 article [sw26676]
  • CryptoSMT - an easy to use tool for cryptanalysis of symmetric primitives likes block ciphers ... easy to use tool for cryptanalysis of symmetric primitives likes block ciphers or hash functions...
  • DeepLLL

  • Referenced in 1 article [sw10240]
  • number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...
  • PotLLL

  • Referenced in 1 article [sw10241]
  • number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...