Results 91 to 100 of about 423 (100)
Some of the next articles are maybe not open access.
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC
Computer/law journal, 2019Kiasu-BC and Joltik-BC are internal tweakable block ciphers of authenticated encryption algorithms Kiasu and Joltik submitted to the CAESAR competition.
Ya Liu +7 more
semanticscholar +1 more source
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
Science China Information Sciences, 2019Rui Zong, Xiaoyang Dong, Xiaoyun Wang
semanticscholar +1 more source
Zero-correlation linear attack on reduced-round SKINNY
Frontiers of Computer Science, 2022Yi Zhang, Ting Cui, Congjun Wang
semanticscholar +1 more source
TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption
International Conference on Cryptology and Information Security in Latin America, 2021Eik List
semanticscholar +1 more source
Square Attack on 7-Round Kiasu-BC
IACR Cryptology ePrint Archive, 2016Christoph Dobraunig +2 more
semanticscholar +1 more source
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
IACR Cryptology ePrint Archive, 2017Christoph Dobraunig, Eik List
semanticscholar +1 more source
Impossible differential attacks on the SKINNY family of block ciphers
IET Information Security, 2017D. Yang, Wen-feng Qi, Huajin Chen
semanticscholar +1 more source
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
IACR Cryptology ePrint Archive, 2019Avik Chakraborti +5 more
semanticscholar +1 more source
Differential Fault Attack on SKINNY Block Cipher
SPACE, 2018Navid Vafaei +3 more
semanticscholar +1 more source

