
NIST Statistical Test Suite
 Referenced in 48 articles
[sw22972]
 statistical testing and its relation to cryptanalysis is also discussed, and some recommended statistical tests ... testing cannot serve as a substitute for cryptanalysis. The design and cryptanalysis of generators...

LBlock
 Referenced in 34 articles
[sw06569]
 margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis and related...

Serpent
 Referenced in 33 articles
[sw21989]
 existing experience of block cipher cryptanalysis. We also used twice as many rounds...

FOX
 Referenced in 20 articles
[sw13586]
 immune to linear and differential cryptanalysis, and we discuss its security towards integral cryptanalysis, algebraic...

ChaCha
 Referenced in 19 articles
[sw07098]
 diffusion per round, conjecturally increasing resistance to cryptanalysis, while preserving—and often improving—time...

Rumba20
 Referenced in 11 articles
[sw07099]
 have been broken by differential cryptanalysis, while ChaCha has not been analyzed yet. We introduce ... novel method for differential cryptanalysis of Salsa20 and ChaCha, inspired by correlation attacks and related ... application of neutral bits in stream cipher cryptanalysis. It allows us to break...

LEX
 Referenced in 18 articles
[sw19585]
 Cryptanalysis of the stream cipher LEX. Biryukov (The Design of a Stream Cipher LEX, Proceedings...

ICEBERG
 Referenced in 17 articles
[sw13243]
 block ciphers. Resistance against sidechannel cryptanalysis was also considered as a design criteria...

Rabbit
 Referenced in 16 articles
[sw08372]
 particular, correlation analysis and algebraic investigations. The cryptanalysis of Rabbit did not reveal an attack...

SHARK
 Referenced in 10 articles
[sw21955]
 cipher is resistant against differential and linear cryptanalysis after a small number of rounds...

ARXtools
 Referenced in 7 articles
[sw09727]
 assess the security those functions against differential cryptanalysis. Our tools are publicly available from...

MicroEliece
 Referenced in 7 articles
[sw09835]
 closely related, a major breakthrough in cryptanalysis tackling one of those problems could render...

EPCBC
 Referenced in 4 articles
[sw11640]
 results on the differential and linear cryptanalysis bounds for the generalized PRESENT when the block ... analyze the resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack ... latest higherorder differential cryptanalysis from FSE 2011 [11]. Our proposed cipher would...

Whirlwind
 Referenced in 3 articles
[sw06748]
 security against stateoftheart cryptanalysis methods is also provided. In comparison ... competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance...

Janus
 Referenced in 3 articles
[sw18580]
 framework for automated independentbiclique cryptanalysis. In this paper we introduce Janus, a software framework...

DeepLLL
 Referenced in 1 article
[sw10240]
 number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...

PotLLL
 Referenced in 1 article
[sw10241]
 number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction...

COFFE
 Referenced in 1 article
[sw15075]
 Cryptanalysis of the authenticated encryption algorithm COFFE. COFFE is a hashbased authenticated encryption scheme...

Enumeration RankKey
 Referenced in 1 article
[sw15087]
 computing bound usually used in classical cryptanalysis is of 2^80. We proposed an algorithm...

CrypTool
 Referenced in 1 article
[sw20675]
 opensource Windows program for cryptography and cryptanalysis. It’s the most widespreaded...