References in zbMATH (referenced in 35 articles )

Showing results 1 to 20 of 35.
Sorted by year (citations)

1 2 next

  1. Ghosh, Sebati; Sarkar, Palash: Variants of Wegman-Carter message authentication code supporting variable tag lengths (2021)
  2. Mennink, Bart; Neves, Samuel: On the resilience of Even-Mansour to invariant permutations (2021)
  3. Gerault, David; Lafourcade, Pascal; Minier, Marine; Solnon, Christine: Computing AES related-key differential characteristics with constraint programming (2020)
  4. Santucci, Pierpaolo; Ingrassia, Emiliano; Picierro, Giulio; Cesati, Marco: MemShield: GPU-assisted software memory encryption (2020)
  5. Chaigneau, Colin; Fuhr, Thomas; Gilbert, Henri; Jean, Jérémy; Reinhard, Jean-René: Cryptanalysis of \textttNORXv2.0 (2019)
  6. Chetry, Moon K.; Bishoi, Susil Kumar; Matyas, Vashek: When lagged Fibonacci generators jump (2019)
  7. Neves, Samuel; Araujo, Filipe: An observation on NORX, BLAKE2, and ChaCha (2019)
  8. Stoffelen, Ko: Efficient cryptography on the RISC-V architecture (2019)
  9. Adomnicai, Alexandre; Fournier, Jacques J. A.; Masson, Laurent: Bricklayer attack: a side-channel analysis on the ChaCha quarter round (2017)
  10. Liu, Yunwen; Wang, Qingju; Rijmen, Vincent: Automatic search of linear trails in ARX with applications to SPECK and Chaskey (2016)
  11. Song, Ling; Huang, Zhangjie; Yang, Qianqian: Automatic differential analysis of ARX block ciphers with application to SPECK and LEA (2016)
  12. Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis: The \textscSimonand \textscSpeckblock ciphers on AVR 8-bit microcontrollers (2015)
  13. Bernstein, Daniel J.; van Gastel, Bernard; Janssen, Wesley; Lange, Tanja; Schwabe, Peter; Smetsers, Sjaak: TweetNaCl: a crypto library in 100 tweets (2015)
  14. Dunkelman, Orr; Keller, Nathan; Shamir, Adi: Slidex attacks on the Even-Mansour encryption scheme (2015)
  15. Ghosh, Shamit; Chowdhury, Dipanwita Roy: CASca: a CA based scalable stream cipher (2015)
  16. Schneider, Tobias; Moradi, Amir; Güneysu, Tim: Arithmetic addition over Boolean masking. Towards first- and second-order resistance in hardware (2015)
  17. Alvarez, Rafael; Zamora, Antonio: A matrix PRNG with s-box output filtering (2014)
  18. Aumasson, Jean-Philippe; Meier, Willi; Phan, Raphael C.-W.; Henzen, Luca: The hash function \textttBLAKE (2014)
  19. Halevi, Shai; Shoup, Victor: Algorithms in HElib (2014)
  20. Khalid, Ayesha; Ravi, Prasanna; Chattopadhyay, Anupam; Paul, Goutam: One word/cycle HC-128 accelerator via state-splitting optimization (2014)

1 2 next