-
81
Impossible differential cryptanalysis of Saturnin algorithm
Published 2022-03-01Subjects: “…lightweight block cipher…”
Get full text
Article -
82
Related-key impossible boomerang cryptanalysis on LBlock
Published 2017-05-01Subjects: Get full text
Article -
83
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article -
84
Improvement Differential fault attack on TWINE
Published 2017-11-01Subjects: “…lightweight block cipher…”
Get full text
Article -
85
Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm
Published 2020-01-01Subjects: “…lightweight block cipher algorithm…”
Get full text
Article -
86
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01Subjects: Get full text
Article -
87
Construction and Research of Lightweight Cryptography SOPT-S Boxes Based on Inverse Mapping in Galois Field
Published 2014-04-01Subjects: Get full text
Article -
88
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation
Published 2022-01-01Subjects: Get full text
Article -
89
Primitive polynomials and word oriented linear feedback shift registers
Published 2009-01-01Subjects: Get full text
Article -
90
Research on linear approximations of simplified Trivium
Published 2016-06-01Subjects: “…stream ciphers…”
Get full text
Article -
91
A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application
Published 2022-01-01Subjects: Get full text
Article -
92
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Published 2022-07-01Subjects: “…tweakable block cipher…”
Get full text
Article -
93
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01Subjects: “…block cipher…”
Get full text
Article -
94
2-adic complexity of SLCE sequence
Published 2019-08-01Subjects: “…stream cipher…”
Get full text
Article -
95
Authenticated encryption mode with blocks skipping
Published 2021-10-01Subjects: Get full text
Article -
96
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
Published 2025-01-01Subjects: Get full text
Article -
97
A digital audio data protection method using parametric action of generalised triangle group on GF(28)
Published 2025-01-01Subjects: Get full text
Article -
98
New related-key rectangle attack on 42-round SHACAL-2
Published 2009-01-01Subjects: “…block cipher…”
Get full text
Article -
99
Related-key rectangle attack on the full ARIRANG encryption mode
Published 2011-01-01Subjects: “…block cipher…”
Get full text
Article -
100
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01Subjects: Get full text
Article