Results 91 to 100 of about 423 (100)
Some of the next articles are maybe not open access.

Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC

Computer/law journal, 2019
Kiasu-BC and Joltik-BC are internal tweakable block ciphers of authenticated encryption algorithms Kiasu and Joltik submitted to the CAESAR competition.
Ya Liu   +7 more
semanticscholar   +1 more source

The Deoxys AEAD Family

Journal of Cryptology, 2021
Jérémy Jean   +3 more
semanticscholar   +2 more sources

Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256

Science China Information Sciences, 2019
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
semanticscholar   +1 more source

Zero-correlation linear attack on reduced-round SKINNY

Frontiers of Computer Science, 2022
Yi Zhang, Ting Cui, Congjun Wang
semanticscholar   +1 more source

TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption

International Conference on Cryptology and Information Security in Latin America, 2021
Eik List
semanticscholar   +1 more source

Square Attack on 7-Round Kiasu-BC

IACR Cryptology ePrint Archive, 2016
Christoph Dobraunig   +2 more
semanticscholar   +1 more source

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC

IACR Cryptology ePrint Archive, 2017
Christoph Dobraunig, Eik List
semanticscholar   +1 more source

Impossible differential attacks on the SKINNY family of block ciphers

IET Information Security, 2017
D. Yang, Wen-feng Qi, Huajin Chen
semanticscholar   +1 more source

Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher

IACR Cryptology ePrint Archive, 2019
Avik Chakraborti   +5 more
semanticscholar   +1 more source

Differential Fault Attack on SKINNY Block Cipher

SPACE, 2018
Navid Vafaei   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy