Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Related-Key Differential Analysis of the AES
Boura, Christina, Derbez, Patrick, Funk, Margot
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Get full text
Journal Article
Loading…
MITM and Differential Fault Attack on ULBC
Ghorai, Shreyasi, Nandi, Mrinal
Published in 2024 Asian Conference on Communication and Networks (ASIANComNet) (24.10.2024)
Published in 2024 Asian Conference on Communication and Networks (ASIANComNet) (24.10.2024)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Meet-in-the-middle attacks on AES with value constraints
Dong, Xiaoli, Liu, Jun, Wei, Yongzhuang, Gao, Wen, Chen, Jie
Published in Designs, codes, and cryptography (01.09.2024)
Published in Designs, codes, and cryptography (01.09.2024)
Get full text
Journal Article
Loading…
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
Dinur, Itai, Dunkelman, Orr, Keller, Nathan, Shamir, Adi
Published in Fast Software Encryption (2015)
Published in Fast Software Encryption (2015)
Get full text
Book Chapter
Loading…
MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection
Ahmad, Ashraf, AbuHour, Yousef, Younisse, Remah, Alslman, Yasmeen, Alnagi, Eman, Abu Al-Haija, Qasem
Published in Journal of sensor and actuator networks (01.06.2022)
Published in Journal of sensor and actuator networks (01.06.2022)
Get full text
Journal Article
Loading…
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
Zhang, Kai, Lai, Xuejia, Wang, Lei, Guan, Jie, Hu, Bin, Wang, Senpeng, Shi, Tairong
Published in Designs, codes, and cryptography (01.09.2023)
Published in Designs, codes, and cryptography (01.09.2023)
Get full text
Journal Article
Loading…
Cryptanalysis of HALFLOOP Block Ciphers
Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes
Published in IACR Transactions on Symmetric Cryptology (01.12.2023)
Published in IACR Transactions on Symmetric Cryptology (01.12.2023)
Get full text
Journal Article
Loading…
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256
Qin, Lingyue, Dong, Xiaoyang, Wang, Anyu, Hua, Jialiang, Wang, Xiaoyun
Published in Advances in Cryptology - ASIACRYPT 2022 (2023)
Published in Advances in Cryptology - ASIACRYPT 2022 (2023)
Get full text
Book Chapter
Loading…
Loading…
Cybersecurity Issues in Smart Grids and Future Power Systems
Year of Publication 2023
Get full text
eBook
Loading…
Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24
Leander, Gregor, Rasoolzadeh, Shahram, Stennes, Lukas
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Get full text
Journal Article
Loading…
Lower data attacks on Advanced Encryption Standard
KARA, ORHUN
Published in Elektrik : Turkish journal of electrical engineering & computer sciences (01.01.2024)
Published in Elektrik : Turkish journal of electrical engineering & computer sciences (01.01.2024)
Get full text
Journal Article
Loading…
Loading…
Cryptanalysis of LowMC instances using single plaintext/ciphertext pair
Subhadeep Banik, Khashayar Barooti, F. Betül Durak, Serge Vaudenay
Published in IACR Transactions on Symmetric Cryptology (01.12.2020)
Published in IACR Transactions on Symmetric Cryptology (01.12.2020)
Get full text
Journal Article
Loading…