Search

Your search keyword '"Linear cryptanalysis"' showing total 1,681 results

Search Constraints

Start Over You searched for: Descriptor "Linear cryptanalysis" Remove constraint Descriptor: "Linear cryptanalysis"
1,681 results on '"Linear cryptanalysis"'

Search Results

1. Utilizing FWT in linear cryptanalysis of block ciphers with various structures.

2. Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing

3. Full Round Distinguishing and Key-Recovery Attacks on SAND-2

4. On security aspects of the ciphers T-310 and SKS with approved long-term keys.

5. Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G

6. New Linear Trails and Linear Hulls of CHAM

7. MILP modeling of matrix multiplication: cryptanalysis of KLEIN and PRINCE.

8. A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON.

9. Improved Linear Cryptanalysis of Block Cipher BORON.

10. Differential and Linear properties of vectorial boolean functions based on chi.

11. Another look at key randomisation hypotheses.

12. New method for combining Matsui's bounding conditions with sequential encoding method.

14. Linear Cryptanalysis of Lightweight Block Cipher WARP

15. Quantum Linear Key-Recovery Attacks Using the QFT

16. On Perfect Linear Approximations and Differentials over Two-Round SPNs

18. Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly -Based Ciphers

19. MILP-Aided Cryptanalysis of the FUTURE Block Cipher

20. Clustering Effect of Iterative Differential and Linear Trails

21. Tighter Trail Bounds for Xoodoo

22. Differential analysis of the NBC algorithm based on mixed integer linear programming model.

23. 动态聚集效应及其在SIMON 算法上的应用.

24. Quantum linear cryptanalysis on a toy cipher.

25. Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations.

26. A Novel Approach for Security Enhancement of Data Encryption Standard.

27. Fast algorithm to search for the minimum number of active S-boxes of block cipher

31. Improved Attacks on GIFT-64

32. A Low-Randomness Second-Order Masked AES

33. Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds.

34. Feedback linearly extended discrete functions.

35. Fast algorithm to search for the minimum number of active S-boxes of block cipher.

36. Analysis of lightweight and efficient symmetric-key primitives

37. Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK

38. Analyzing Masked Ciphers Against Transition and Coupling Effects

39. Clustering Effect in Simon and Simeck

40. A Geometric Approach to Linear Cryptanalysis

42. Linear Cryptanalysis of FF3-1 and FEA

43. New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming

44. MILP modeling of matrix multiplication: cryptanalysis of KLEIN and PRINCE

46. Exploiting Linearity in White-Box AES with Differential Computation Analysis

47. PVW: An Efficient Dynamic Symmetric Cipher to Enable End-to-End Secure Communication

48. Cryptanalysis of Masked Ciphers: A Not So Random Idea

49. On the Design of Bit Permutation Based Ciphers : The Interplay Among S-Box, Bit Permutation and Key-Addition

50. Generalized Matsui Algorithm 1 with Application for the Full DES

Catalog

Books, media, physical & digital resources