• Piccolo

  • Referenced in 45 articles [sw13242]
  • known analyses including recent related-key differential attacks and meet-in-the-middle attacks...
  • LBlock

  • Referenced in 41 articles [sw06569]
  • enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis...
  • CubeHash

  • Referenced in 12 articles [sw07100]
  • Improved linear differential attacks on CubeHash This paper presents improved collision attacks on round-reduced ... finding linear differential trails that lead to lower estimated attack complexities when used within ... such trails lead to much faster collision attacks. We demonstrate this by providing a real ... highly probable linear differential trails and leads to significantly better attacks for up to eight...
  • Rumba20

  • Referenced in 12 articles [sw07099]
  • method for differential cryptanalysis of Salsa20 and ChaCha, inspired by correlation attacks and related ... simplified variants, then we discuss differential attacks on the original version, and exploit a high...
  • ARXtools

  • Referenced in 9 articles [sw09727]
  • skein. In this paper, we study differential attacks against ARX schemes. We build upon ... algorithm to build complex non-linear differential characteristics for ARX constructions, that we applied ... present several characteristics for use in various attack scenarios: on the one hand we show ... free-start and semi-free-start collision attacks for 20 rounds and 12 rounds...
  • Square

  • Referenced in 51 articles [sw26286]
  • against differential and linear cryptanalysis. However, after the initial design a dedicated attack was mounted...
  • EPCBC

  • Referenced in 5 articles [sw11640]
  • provides strong protection against related-key differential attacks, a recent class of powerful attacks ... Related-key attacks are especially relevant when a block cipher is used as a hash ... also obtain new results on the differential and linear cryptanalysis bounds for the generalized PRESENT ... attack, slide attack, algebraic attack and the latest higher-order differential cryptanalysis from...
  • FOX

  • Referenced in 21 articles [sw13586]
  • differential cryptanalysis, and we discuss its security towards integral cryptanalysis, algebraic attacks, and other attacks...
  • DRECON

  • Referenced in 1 article [sw09088]
  • which are naturally resistant against side-channel attacks. The present paper proposes a scheme called ... block cipher with innate protection against differential power attacks (DPA). The scheme is motivated...
  • Pufferfish

  • Referenced in 2 articles [sw12982]
  • analyze differential privacy and formalize a connection to attackers who believe that the data records...
  • JavaFoil

  • Referenced in 3 articles [sw19900]
  • airfoil for any desired angle of attack. The boundary layer analysis module steps along ... stagnation point. It solves a set of differential equations to find the various boundary layer...
  • Coq

  • Referenced in 1526 articles [sw00161]
  • Coq is a formal proof management system. It...
  • FGb

  • Referenced in 226 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • GAP

  • Referenced in 2398 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • gmp

  • Referenced in 233 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Macaulay2

  • Referenced in 1364 articles [sw00537]
  • Macaulay2 is a software system devoted to supporting...
  • Magma

  • Referenced in 2356 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 4699 articles [sw00545]
  • The result of over 30 years of cutting...
  • MATCONT

  • Referenced in 252 articles [sw00551]
  • MATCONT: Matlab software for bifurcation study of dynamical...
  • Mathematica

  • Referenced in 5206 articles [sw00554]
  • Almost any workflow involves computing results, and that...