References in zbMATH (referenced in 31 articles )

Showing results 1 to 20 of 31.
Sorted by year (citations)

1 2 next

  1. Gerault, David; Lafourcade, Pascal; Minier, Marine; Solnon, Christine: Computing AES related-key differential characteristics with constraint programming (2020)
  2. Chaigneau, Colin; Fuhr, Thomas; Gilbert, Henri; Jean, Jérémy; Reinhard, Jean-René: Cryptanalysis of \textttNORXv2.0 (2019)
  3. Chetry, Moon K.; Bishoi, Susil Kumar; Matyas, Vashek: When lagged Fibonacci generators jump (2019)
  4. Neves, Samuel; Araujo, Filipe: An observation on NORX, BLAKE2, and ChaCha (2019)
  5. Stoffelen, Ko: Efficient cryptography on the RISC-V architecture (2019)
  6. Adomnicai, Alexandre; Fournier, Jacques J. A.; Masson, Laurent: Bricklayer attack: a side-channel analysis on the ChaCha quarter round (2017)
  7. Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
  8. Song, Ling; Huang, Zhangjie; Yang, Qianqian: Automatic differential analysis of ARX block ciphers with application to SPECK and LEA (2016)
  9. Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis: The \textscSimonand \textscSpeckblock ciphers on AVR 8-bit microcontrollers (2015)
  10. Bernstein, Daniel J.; van Gastel, Bernard; Janssen, Wesley; Lange, Tanja; Schwabe, Peter; Smetsers, Sjaak: TweetNaCl: a crypto library in 100 tweets (2015)
  11. Dunkelman, Orr; Keller, Nathan; Shamir, Adi: Slidex attacks on the Even-Mansour encryption scheme (2015)
  12. Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
  13. Schneider, Tobias; Moradi, Amir; Güneysu, Tim: Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware (2015)
  14. Aumasson, Jean-Philippe; Meier, Willi; Phan, Raphael C.-W.; Henzen, Luca: The hash function \textttBLAKE (2014)
  15. Halevi, Shai; Shoup, Victor: Algorithms in HElib (2014)
  16. Khalid, Ayesha; Ravi, Prasanna; Chattopadhyay, Anupam; Paul, Goutam: One word/cycle HC-128 accelerator via state-splitting optimization (2014)
  17. Seo, Hwajeong; Liu, Zhe; Park, Taehwan; Kim, Hyunjin; Lee, Yeoncheol; Choi, Jongseok; Kim, Howon: Parallel implementations of LEA (2014)
  18. Khalid, Ayesha; Paul, Goutam; Chattopadhyay, Anupam: New speed records for Salsa20 stream cipher using an autotuning framework on GPUs (2013)
  19. Li, Jie; Zheng, Jianliang: MaD2: an ultra-performance stream cipher for pervasive data encryption (2013)
  20. Rijmen, Vincent: Extracts from the SHA-3 competition (2013)

1 2 next