DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Rebound attack
Rebound attack
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Efficient Hashing Using the AES Instruction
International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, ISSN 2321-3469
Rotational Rebound Attacks on Reduced Skein
Minalpher V1.1
Rebound Attacks on Stribog
CRYPTREC Report 2009 暗号方式委員会報告書
CRYPTREC Report 2008 暗号技術監視委員会報告書
Efficient Large-State Tweakable Block Ciphers from the AES Round Function
Rebound Attacks on Stribog
Stribobr2: “WHIRLBOB”
A Meet in the Middle Attack on Reduced Round Kuznyechik
Biclique Cryptanalysis of the Full AES
On the Impact of Known-Key Attacks on Hash Functions
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Cryptanalysis of Some Block Cipher Constructions
PEIGEN – a Platform for Evaluation, Implementation, and Generation of S‑Boxes
Analysis and Design of Authenticated Ciphers
Top View
WHIRLBOB, the Whirlpool Based Variant of STRIBOB Lighter, Faster, and Constant Time
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
Known and Chosen Key Differential Distinguishers for Block Ciphers
Contributions to Cryptanalysis: Design and Analysis of Cryptographic Hash Functions
Cryptanalysis of AES-Based Hash Functions
Improved Rebound Attack on the Finalist Grøstl
Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function
Elephant V2 Specification
Rebound Attack on JH42
V. Ruzhentsev
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
KNOT: Algorithm Specifications and Supporting Document
Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256∗
PHOTON-Beetle Authenticated Encryption and Hash Family
Cryptography and Cryptanalysis: a Review
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Faster Chosen-Key Distinguishers on Reduced-Round AES Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean
Chaskey: a Lightweight MAC Algorithm for Microcontrollers⋆
Design and Analysis of Cryptographic Algorithms
A Meet in the Middle Attack on Reduced Round Kuznyechik
Some Aspects of Block Ciphers
Design and Analysis of Symmetric Primitives
Methods of Symmetric Cryptanalysis
A Review Paper on Concepts of Cryptography and Cryptographic Hash Function
Improved Preimage and Collision Attacks
Cryptanalysis of Some AES-Based Cryptographic Primitives
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Design and Analysis of Symmetric Primitives
Design Space Exploration for Ultra-Low Energy and Secure Iot Mcus
Status Report on the Second Round of the SHA-3 Cryptographic Hash
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon
PAEQ: Parallelizable Permutation-Based Authenticated Encryption (Full Version)
KNOT Specification
Rebound Attack on the Full Lane Compression Function ?
Simpira V2: a Family of Efficient Permutations Using the AES Round
Security Analysis of Cryptographic Algorithms
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher