• LBlock

  • Referenced in 43 articles [sw06569]
  • LBlock is 64-bit and the key size is 80-bit. Our security evaluation shows ... linear cryptanalysis, impossible differential cryptanalysis and related-key attacks etc. Furthermore, LBlock can be implemented...
  • Piccolo

  • Referenced in 48 articles [sw13242]
  • against known analyses including recent related-key differential attacks and meet-in-the-middle attacks...
  • tweakey

  • Referenced in 24 articles [sw12816]
  • block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • related-key differential attacks, a recent class of powerful attacks on AES. Related-key attacks...
  • PRINCE

  • Referenced in 59 articles [sw13240]
  • corresponds to encryption with a related key. This property we refer to as $alpha $-reflection ... prove its soundness against generic attacks...
  • SKINNY

  • Referenced in 20 articles [sw17435]
  • stronger security guarantees with regards to differential/linear attacks. In particular, unlike ๐š‚๐™ธ๐™ผ๐™พ๐™ฝ, we are able ... only in the single-key model, but also in the related-key or related-tweak...
  • ZHFE

  • Referenced in 11 articles [sw39671]
  • polynomials. The inversion of the public key is performed using a low degree polynomial ... ZHFE is relatively efficient and that it is secure against the main attacks that have...
  • AIQL

  • Referenced in 1 article [sw39057]
  • relational databases and graph databases lack language constructs to express key properties of major attack...
  • MANTIS

  • Referenced in 3 articles [sw21866]
  • stronger security guarantees with regards to differential/linear attacks. In particular, unlike ๐š‚๐™ธ๐™ผ๐™พ๐™ฝ, we are able ... only in the single-key model, but also in the related-key or related-tweak...
  • MemShield

  • Referenced in 1 article [sw37367]
  • principal defensive weapon against Cold Boot attacks is memory encryption. In this work we propose ... safely store the master key and perform the encryption/decryption operations. We developed a prototype that ... kernel. We discuss the design, the related works, the implementation, the security analysis...
  • FGb

  • Referenced in 246 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • GAP

  • Referenced in 3068 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • gmp

  • Referenced in 275 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Magma

  • Referenced in 3137 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5296 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6235 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13100 articles [sw00558]
  • MATLABยฎ is a high-level language and interactive...
  • NTL

  • Referenced in 211 articles [sw00638]
  • NTL is a high-performance, portable C++ library...
  • PARI/GP

  • Referenced in 627 articles [sw00680]
  • PARI/GP is a widely used Computer Algebra System...
  • R

  • Referenced in 9188 articles [sw00771]
  • R is a language and environment for statistical...