References in zbMATH (referenced in 36 articles )

Showing results 1 to 20 of 36.
Sorted by year (citations)

1 2 next

  1. Ghosh, Sebati; Sarkar, Palash: Variants of Wegman-Carter message authentication code supporting variable tag lengths (2021)
  2. Mennink, Bart; Neves, Samuel: On the resilience of Even-Mansour to invariant permutations (2021)
  3. Sadeghi, Sadegh; Rijmen, Vincent; Bagheri, Nasour: Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK (2021)
  4. Gerault, David; Lafourcade, Pascal; Minier, Marine; Solnon, Christine: Computing AES related-key differential characteristics with constraint programming (2020)
  5. Santucci, Pierpaolo; Ingrassia, Emiliano; Picierro, Giulio; Cesati, Marco: MemShield: GPU-assisted software memory encryption (2020)
  6. Chaigneau, Colin; Fuhr, Thomas; Gilbert, Henri; Jean, Jérémy; Reinhard, Jean-René: Cryptanalysis of \textttNORXv2.0 (2019)
  7. Chetry, Moon K.; Bishoi, Susil Kumar; Matyas, Vashek: When lagged Fibonacci generators jump (2019)
  8. Neves, Samuel; Araujo, Filipe: An observation on NORX, BLAKE2, and ChaCha (2019)
  9. Stoffelen, Ko: Efficient cryptography on the RISC-V architecture (2019)
  10. Adomnicai, Alexandre; Fournier, Jacques J. A.; Masson, Laurent: Bricklayer attack: a side-channel analysis on the ChaCha quarter round (2017)
  11. Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
  12. Song, Ling; Huang, Zhangjie; Yang, Qianqian: Automatic differential analysis of ARX block ciphers with application to SPECK and LEA (2016)
  13. Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis: The \textscSimonand \textscSpeckblock ciphers on AVR 8-bit microcontrollers (2015)
  14. Bernstein, Daniel J.; van Gastel, Bernard; Janssen, Wesley; Lange, Tanja; Schwabe, Peter; Smetsers, Sjaak: TweetNaCl: a crypto library in 100 tweets (2015)
  15. Dunkelman, Orr; Keller, Nathan; Shamir, Adi: Slidex attacks on the Even-Mansour encryption scheme (2015)
  16. Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
  17. Schneider, Tobias; Moradi, Amir; Güneysu, Tim: Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware (2015)
  18. Alvarez, Rafael; Zamora, Antonio: A matrix PRNG with s-box output filtering (2014)
  19. Aumasson, Jean-Philippe; Meier, Willi; Phan, Raphael C.-W.; Henzen, Luca: The hash function \textttBLAKE (2014)
  20. Halevi, Shai; Shoup, Victor: Algorithms in HElib (2014)

1 2 next