
LBlock
 Referenced in 23 articles
[sw06569]
 margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis and related...

FOX
 Referenced in 19 articles
[sw13586]
 immune to linear and differential cryptanalysis, and we discuss its security towards integral cryptanalysis, algebraic...

ICEBERG
 Referenced in 15 articles
[sw13243]
 block ciphers. Resistance against sidechannel cryptanalysis was also considered as a design criteria...

Rumba20
 Referenced in 9 articles
[sw07099]
 have been broken by differential cryptanalysis, while ChaCha has not been analyzed yet. We introduce ... novel method for differential cryptanalysis of Salsa20 and ChaCha, inspired by correlation attacks and related ... application of neutral bits in stream cipher cryptanalysis. It allows us to break...

ChaCha
 Referenced in 14 articles
[sw07098]
 diffusion per round, conjecturally increasing resistance to cryptanalysis, while preserving—and often improving—time...

Rabbit
 Referenced in 13 articles
[sw08372]
 particular, correlation analysis and algebraic investigations. The cryptanalysis of Rabbit did not reveal an attack...

MicroEliece
 Referenced in 7 articles
[sw09835]
 closely related, a major breakthrough in cryptanalysis tackling one of those problems could render...

EPCBC
 Referenced in 4 articles
[sw11640]
 results on the differential and linear cryptanalysis bounds for the generalized PRESENT when the block ... analyze the resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack ... latest higherorder differential cryptanalysis from FSE 2011 [11]. Our proposed cipher would...

ARXtools
 Referenced in 6 articles
[sw09727]
 assess the security those functions against differential cryptanalysis. Our tools are publicly available from...

Janus
 Referenced in 2 articles
[sw18580]
 framework for automated independentbiclique cryptanalysis. In this paper we introduce Janus, a software framework...

Whirlwind
 Referenced in 1 article
[sw06748]
 security against stateoftheart cryptanalysis methods is also provided. In comparison ... competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance...

DeepLLL
 Referenced in 1 article
[sw10240]
 number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...

PotLLL
 Referenced in 1 article
[sw10241]
 number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...

COFFE
 Referenced in 1 article
[sw15075]
 Cryptanalysis of the authenticated encryption algorithm COFFE. COFFE is a hashbased authenticated encryption scheme...

Enumeration RankKey
 Referenced in 1 article
[sw15087]
 computing bound usually used in classical cryptanalysis is of 2^80. We proposed an algorithm...

Sage Sbox
 Referenced in 1 article
[sw16620]
 cryptographic ciphers against linear and differential cryptanalysis. The toolkit generates a MixedInteger Linear Programming...

Ganzua
 Referenced in 0 articles
[sw05626]
 Ganzua is a cryptanalysis tool for classical ciphers (monoalphabetic and polyalphabetic) that lets the user ... plain alphabets, allowing for the proper cryptanalysis of cryptograms obtained from nonEnglish text...

ATLAS
 Referenced in 180 articles
[sw00056]
 This paper describes the Automatically Tuned Linear Algebra...

FGb
 Referenced in 213 articles
[sw00286]
 FGb/Gb libraryGb is a program (191 420 lines...

GAP
 Referenced in 1667 articles
[sw00320]
 GAP is a system for computational discrete algebra...