
LBlock
 Referenced in 23 articles
[sw06569]
 margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis and related...

FOX
 Referenced in 20 articles
[sw13586]
 immune to linear and differential cryptanalysis, and we discuss its security towards integral cryptanalysis, algebraic...

LEX
 Referenced in 16 articles
[sw19585]
 Cryptanalysis of the stream cipher LEX. Biryukov (The Design of a Stream Cipher LEX, Proceedings...

ICEBERG
 Referenced in 15 articles
[sw13243]
 block ciphers. Resistance against sidechannel cryptanalysis was also considered as a design criteria...

Rumba20
 Referenced in 9 articles
[sw07099]
 have been broken by differential cryptanalysis, while ChaCha has not been analyzed yet. We introduce ... novel method for differential cryptanalysis of Salsa20 and ChaCha, inspired by correlation attacks and related ... application of neutral bits in stream cipher cryptanalysis. It allows us to break...

ChaCha
 Referenced in 14 articles
[sw07098]
 diffusion per round, conjecturally increasing resistance to cryptanalysis, while preserving—and often improving—time...

Rabbit
 Referenced in 14 articles
[sw08372]
 particular, correlation analysis and algebraic investigations. The cryptanalysis of Rabbit did not reveal an attack...

MicroEliece
 Referenced in 7 articles
[sw09835]
 closely related, a major breakthrough in cryptanalysis tackling one of those problems could render...

EPCBC
 Referenced in 4 articles
[sw11640]
 results on the differential and linear cryptanalysis bounds for the generalized PRESENT when the block ... analyze the resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack ... latest higherorder differential cryptanalysis from FSE 2011 [11]. Our proposed cipher would...

ARXtools
 Referenced in 6 articles
[sw09727]
 assess the security those functions against differential cryptanalysis. Our tools are publicly available from...

Janus
 Referenced in 2 articles
[sw18580]
 framework for automated independentbiclique cryptanalysis. In this paper we introduce Janus, a software framework...

Whirlwind
 Referenced in 1 article
[sw06748]
 security against stateoftheart cryptanalysis methods is also provided. In comparison ... competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance...

DeepLLL
 Referenced in 1 article
[sw10240]
 number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...

PotLLL
 Referenced in 1 article
[sw10241]
 number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...

COFFE
 Referenced in 1 article
[sw15075]
 Cryptanalysis of the authenticated encryption algorithm COFFE. COFFE is a hashbased authenticated encryption scheme...

Enumeration RankKey
 Referenced in 1 article
[sw15087]
 computing bound usually used in classical cryptanalysis is of 2^80. We proposed an algorithm...

CrypTool
 Referenced in 1 article
[sw20675]
 opensource Windows program for cryptography and cryptanalysis. It’s the most widespreaded...

Ganzua
 Referenced in 0 articles
[sw05626]
 Ganzua is a cryptanalysis tool for classical ciphers (monoalphabetic and polyalphabetic) that lets the user ... plain alphabets, allowing for the proper cryptanalysis of cryptograms obtained from nonEnglish text...

ATLAS
 Referenced in 182 articles
[sw00056]
 This paper describes the Automatically Tuned Linear Algebra...

FGb
 Referenced in 220 articles
[sw00286]
 FGb/Gb libraryGb is a program (191 420 lines...