• LBlock

  • Referenced in 23 articles [sw06569]
  • margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis and related...
  • FOX

  • Referenced in 20 articles [sw13586]
  • immune to linear and differential cryptanalysis, and we discuss its security towards integral cryptanalysis, algebraic...
  • LEX

  • Referenced in 16 articles [sw19585]
  • Cryptanalysis of the stream cipher LEX. Biryukov (The Design of a Stream Cipher LEX, Proceedings...
  • ICEBERG

  • Referenced in 15 articles [sw13243]
  • block ciphers. Resistance against side-channel cryptanalysis was also considered as a design criteria...
  • Rumba20

  • Referenced in 9 articles [sw07099]
  • have been broken by differential cryptanalysis, while ChaCha has not been analyzed yet. We introduce ... novel method for differential cryptanalysis of Salsa20 and ChaCha, inspired by correlation attacks and related ... application of neutral bits in stream cipher cryptanalysis. It allows us to break...
  • ChaCha

  • Referenced in 14 articles [sw07098]
  • diffusion per round, conjecturally increasing resistance to cryptanalysis, while preserving—and often improving—time...
  • Rabbit

  • Referenced in 14 articles [sw08372]
  • particular, correlation analysis and algebraic investigations. The cryptanalysis of Rabbit did not reveal an attack...
  • MicroEliece

  • Referenced in 7 articles [sw09835]
  • closely related, a major breakthrough in cryptanalysis tackling one of those problems could render...
  • EPCBC

  • Referenced in 4 articles [sw11640]
  • results on the differential and linear cryptanalysis bounds for the generalized PRESENT when the block ... analyze the resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack ... latest higher-order differential cryptanalysis from FSE 2011 [11]. Our proposed cipher would...
  • ARXtools

  • Referenced in 6 articles [sw09727]
  • assess the security those functions against differential cryptanalysis. Our tools are publicly available from...
  • Janus

  • Referenced in 2 articles [sw18580]
  • framework for automated independent-biclique cryptanalysis. In this paper we introduce Janus, a software framework...
  • Whirlwind

  • Referenced in 1 article [sw06748]
  • security against state-of-the-art cryptanalysis methods is also provided. In comparison ... competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance...
  • DeepLLL

  • Referenced in 1 article [sw10240]
  • number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...
  • PotLLL

  • Referenced in 1 article [sw10241]
  • number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...
  • COFFE

  • Referenced in 1 article [sw15075]
  • Cryptanalysis of the authenticated encryption algorithm COFFE. COFFE is a hash-based authenticated encryption scheme...
  • Enumeration RankKey

  • Referenced in 1 article [sw15087]
  • computing bound usually used in classical cryptanalysis is of 2^80. We proposed an algorithm...
  • CrypTool

  • Referenced in 1 article [sw20675]
  • open-source Windows program for cryptography and cryptanalysis. It’s the most wide-spreaded...
  • Ganzua

  • Referenced in 0 articles [sw05626]
  • Ganzua is a cryptanalysis tool for classical ciphers (monoalphabetic and polyalphabetic) that lets the user ... plain alphabets, allowing for the proper cryptanalysis of cryptograms obtained from non-English text...
  • ATLAS

  • Referenced in 182 articles [sw00056]
  • This paper describes the Automatically Tuned Linear Algebra...
  • FGb

  • Referenced in 216 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...