Results 131 to 140 of about 38,531 (142)
Some of the next articles are maybe not open access.
Strenght of MISTY1 without FL Function for Higher Order Differential Attack
International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 1999Hidema Tanaka +2 more
semanticscholar +1 more source
Higher Order Differential Attack on 6-Round MISTY1
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2009Y. Tsunoo +3 more
semanticscholar +1 more source
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures
International Conference on Information Security and Cryptology, 2000Ju-Sung Kang, S. Chee, Choonsik Park
semanticscholar +1 more source
Conditional Differential Cryptanalysis for Kreyvium
Australasian Conference on Information Security and Privacy, 2017Yuhei Watanabe, Takanori Isobe, M. Morii
semanticscholar +1 more source
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
IACR Cryptology ePrint Archive, 2020Hossein Arabnezhad-Khanoki +1 more
semanticscholar +1 more source
The 12th-Order Differential Attack on the 10-Round Variants of Midori64 Block Cipher
International Conference on Advanced Information Networking and Applications, 2017Yusuke Takahashi, Y. Igarashi, T. Kaneko
semanticscholar +1 more source
The peculiar third-order differential characteristics of Midori64 block cipher(II)
2017 International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), 2017Yusuke Takahashi, Y. Igarashi, T. Kaneko
semanticscholar +1 more source
Blind Differential Cryptanalysis for Enhanced Power Attacks
ACM Symposium on Applied Computing, 2006H. Handschuh, B. Preneel
semanticscholar +1 more source
Higher Order Differential Cryptanalysis of Multivariate Hash Functions.
Yiyuan Luo, Xuejia Lai
openalex
Integral cryptanalysis of SPN ciphers with binary permutations
Science China Information Sciences, 2017Hailong Song, Yuechuan Wei
semanticscholar +1 more source

