References in zbMATH (referenced in 26 articles )

Showing results 1 to 20 of 26.
Sorted by year (citations)

1 2 next

  1. Adomnicai, Alexandre; Fournier, Jacques J. A.; Masson, Laurent: Bricklayer attack: a side-channel analysis on the ChaCha quarter round (2017)
  2. Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
  3. Song, Ling; Huang, Zhangjie; Yang, Qianqian: Automatic differential analysis of ARX block ciphers with application to SPECK and LEA (2016)
  4. Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis: The Simon and Speck block ciphers on AVR 8-bit microcontrollers (2015)
  5. Bernstein, Daniel J.; van Gastel, Bernard; Janssen, Wesley; Lange, Tanja; Schwabe, Peter; Smetsers, Sjaak: TweetNaCl: a crypto library in 100 tweets (2015)
  6. Dunkelman, Orr; Keller, Nathan; Shamir, Adi: Slidex attacks on the Even-Mansour encryption scheme (2015)
  7. Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
  8. Schneider, Tobias; Moradi, Amir; Güneysu, Tim: Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware (2015)
  9. Aumasson, Jean-Philippe; Meier, Willi; Phan, Raphael C.-W.; Henzen, Luca: The hash function BLAKE (2014)
  10. Halevi, Shai; Shoup, Victor: Algorithms in HElib (2014)
  11. Khalid, Ayesha; Ravi, Prasanna; Chattopadhyay, Anupam; Paul, Goutam: One word/cycle HC-128 accelerator via state-splitting optimization (2014)
  12. Seo, Hwajeong; Liu, Zhe; Park, Taehwan; Kim, Hyunjin; Lee, Yeoncheol; Choi, Jongseok; Kim, Howon: Parallel implementations of LEA (2014)
  13. Khalid, Ayesha; Paul, Goutam; Chattopadhyay, Anupam: New speed records for Salsa20 stream cipher using an autotuning framework on GPUs (2013)
  14. Li, Jie; Zheng, Jianliang: MaD2: an ultra-performance stream cipher for pervasive data encryption (2013)
  15. Rijmen, Vincent: Extracts from the SHA-3 competition (2013)
  16. Bernstein, Daniel J.; Lange, Tanja; Schwabe, Peter: The security impact of a new cryptographic library (2012)
  17. Borghoff, Julia; Canteaut, Anne; Güneysu, Tim; Kavun, Elif Bilge; Knezevic, Miroslav; Knudsen, Lars R.; Leander, Gregor; Nikov, Ventzislav; Paar, Christof; Rechberger, Christian; Rombouts, Peter; Thomsen, Søren S.; Yalçın, Tolga: PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract (2012)
  18. Wu, Hongjun; Huang, Tao; Nguyen, Phuong Ha; Wang, Huaxiong; Ling, San: Differential attacks against stream cipher ZUC (2012)
  19. Mouha, Nicky; Velichkov, Vesselin; De Cannière, Christophe; Preneel, Bart: The differential analysis of S-functions (2011)
  20. Velichkov, Vesselin; Mouha, Nicky; De Cannière, Christophe; Preneel, Bart: The additive differential probability of ARX (2011)

1 2 next