ARIA (cipher)
Top View
- Related-Cipher Attacks on Block Ciphers with Flexible Number Of
- Cryptanalysis of AES-Based Hash Functions
- Integral Cryptanalysis of SPN Ciphers with Binary Permutations
- Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and finite field Multiplication
- My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
- Avtcore W. Kim Internet-Draft J. Lee Intended Status: Standards Track D
- Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
- Authenticated Encryption Requirements
- Automatic Search of Truncated Impossible Differentials for Word
- Improved Integral Attacks on Reduced Round Camellia
- A Review on Combined Attacks on Security Systems
- Improved Linear Cryptanalysis of Round-Reduced ARIA
- University of Southampton Research Repository Eprints Soton
- Internet Engineering Task Force (IETF) W. Kim Request for Comments: 6209 J
- Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-Sum and FFT
- New Impossible Differential Search Tool from Design and Cryptanalysis
- Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things
- New Block Cipher: ARIA