DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Biclique attack
Biclique attack
The First Biclique Cryptanalysis of Serpent-256
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers
Cryptanalysis of Block Ciphers, Stream Ciphers, Modes of Operation Of
A Note on an Infeasible Linearization of Some Block Ciphers
Algebraic Complexity Reduction and Cryptanalysis of GOST Nicolas T
SKINNY-AEAD and SKINNY-Hash Specification
The Dblock Family of Block Ciphers
Meet-In-The-Middle Attacks on Reduced-Round Hierocrypt-3
An Overview of Cryptographic Primitives for Possible Use in 5G and Beyond
Differential Sieving for 2-Step Matching Meet-In-The-Middle Attack
Biclique Cryptanalysis of the Full AES
D2.1 First Report on New QR Cryptographic Primitives
Narrow-Bicliques: Cryptanalysis of Full IDEA
Block Ciphers
Part XII from Theory to Practice in Cryptography
Biclique Cryptanalysis of the Full AES⋆
Cryptanalysis of Some Block Cipher Constructions
Top View
Lightweight Block Ciphers for Iot Based Applications: a Review
Comparison of Symmetric Key Algorithms for Iot Devices
Design and Implementation of Lightweight and Secure Cryptographic Algorithms for Embedded Devices Lama Sleem
Single-Cycle Implementations of Block Ciphers
New Insights on AES-Like SPN Ciphers ⋆
LNCS 7073, Pp
A Splice-And-Cut Cryptanalysis of the AES
The Internet of Insecure Things Analyzing a Low-Energy Protocol and Cryptographic Solutions
SKINNY-AEAD and SKINNY-Hash
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo
Anabilim Dali Bilgisayar Mühendisliği Doktora Tezi Maksimum Uzaklikta Ayrilabilen Matrislerin Elde Edilebilmesi
AKF: a Key Alternating Feistel Scheme for Lightweight Cipher Designs ∗∗ ∗ F
Cryptographic Key Infrastructure for Security Services Protecting Tt&C And
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
A Simple AEAD Scheme a Submission to the NIST Lightweight Cryptography Standardization Process
Analysis of Block Cipher Constructions Against Biclique and Multiset Attacks
SKINNY-AEAD and SKINNY-Hash
Design and Analysis of Symmetric Primitives
Cryptanalytic Attacks on International Data Encryption Algorithm Block Cipher
Match Box Meet-In-The-Middle Attack Against KATAN
Design and Analysis of Symmetric Primitives
Design Space Exploration for Ultra-Low Energy and Secure Iot Mcus
A Vulnerability-Tolerant Communication Protocol
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future Directions
Vttls: a Vulnerability-Tolerant Communication Protocol
Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes
Security Bound of Biclique Attacks on AES-128
Cryptrec Ex-2203-2012
Lecture 8: AES: the Advanced Encryption Standard