References in zbMATH (referenced in 45 articles )

Showing results 1 to 20 of 45.
Sorted by year (citations)

1 2 3 next

  1. Ashur, Tomer; Beyne, Tim; Rijmen, Vincent: Revisiting the wrong-key-randomization hypothesis (2020)
  2. Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan: Revised version of block cipher CHAM (2020)
  3. Zhao, Boxin; Dong, Xiaoyang; Meier, Willi; Jia, Keting; Wang, Gaoli: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (2020)
  4. Sadeghi, Sadegh; Bagheri, Nasour: Security analysis of SIMECK block cipher against related-key impossible differential (2019)
  5. Alsalami, Yousuf: Constructions with high algebraic degree of differentially 4-uniform ((n, n - 1))-functions and differentially 8-uniform ((n, n - 2))-functions (2018)
  6. Koo, Bonwook; Roh, Dongyoung; Kim, Hyeonjin; Jung, Younghoon; Lee, Dong-Geon; Kwon, Daesung: CHAM: a family of lightweight block ciphers for resource-constrained devices (2018)
  7. Abdelkhalek, Ahmed; Tolba, Mohamed; Youssef, Amr M.: Impossible differential attack on reduced round SPARX-64/128 (2017)
  8. Hao, Yonglin; Meier, Willi: Truncated differential based known-key attacks on round-reduced SIMON (2017)
  9. Sasaki, Yu; Todo, Yosuke: New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers (2017)
  10. Zajac, Pavol: Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (2017)
  11. Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian; Roy, Arnab; Tiessen, Tyge: MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity (2016)
  12. Ashur, Tomer; Rijmen, Vincent: On linear hulls and trails (2016)
  13. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Exploring energy efficiency of lightweight block ciphers (2016)
  14. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
  15. Beierle, Christof: Pen and paper arguments for SIMON and SIMON-like designs (2016)
  16. Biryukov, Alex; Dinu, Daniel; Großschädl, Johann: Correlation power analysis of lightweight block ciphers: from theory to practice (2016)
  17. Biryukov, Alex; Velichkov, Vesselin; Le Corre, Yann: Automatic search for the best trails in ARX: application to block cipher \textscSpeck (2016)
  18. Chen, Cong; Farmani, Mohammad; Eisenbarth, Thomas: A tale of two shares: why two-share threshold implementation seems worthwhile -- and why it Is not (2016)
  19. Derbez, Patrick; Fouque, Pierre-Alain: Automatic search of meet-in-the-middle and impossible differential attacks (2016)
  20. Dinu, Daniel; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Großschädl, Johann; Biryukov, Alex: Design strategies for ARX with provable bounds: \textscSparxand \textscLAX (2016)

1 2 3 next