Results 131 to 140 of about 38,531 (142)
Some of the next articles are maybe not open access.

Strenght of MISTY1 without FL Function for Higher Order Differential Attack

International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 1999
Hidema Tanaka   +2 more
semanticscholar   +1 more source

Higher Order Differential Attack on 6-Round MISTY1

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2009
Y. Tsunoo   +3 more
semanticscholar   +1 more source

A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures

International Conference on Information Security and Cryptology, 2000
Ju-Sung Kang, S. Chee, Choonsik Park
semanticscholar   +1 more source

Conditional Differential Cryptanalysis for Kreyvium

Australasian Conference on Information Security and Privacy, 2017
Yuhei Watanabe, Takanori Isobe, M. Morii
semanticscholar   +1 more source

Toward A More Efficient Gröbner-based Algebraic Cryptanalysis

IACR Cryptology ePrint Archive, 2020
Hossein Arabnezhad-Khanoki   +1 more
semanticscholar   +1 more source

The 12th-Order Differential Attack on the 10-Round Variants of Midori64 Block Cipher

International Conference on Advanced Information Networking and Applications, 2017
Yusuke Takahashi, Y. Igarashi, T. Kaneko
semanticscholar   +1 more source

The peculiar third-order differential characteristics of Midori64 block cipher(II)

2017 International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), 2017
Yusuke Takahashi, Y. Igarashi, T. Kaneko
semanticscholar   +1 more source

Blind Differential Cryptanalysis for Enhanced Power Attacks

ACM Symposium on Applied Computing, 2006
H. Handschuh, B. Preneel
semanticscholar   +1 more source

Integral cryptanalysis of SPN ciphers with binary permutations

Science China Information Sciences, 2017
Hailong Song, Yuechuan Wei
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy