Relating Differential Distribution Tables to Other Propertiesof of Substitution Boxes
Designs, Codes and Cryptography
Linear Frameworks for Block Ciphers
Designs, Codes and Cryptography
Strenght of MISTY1 without FL Function for Higher Order Differential Attack
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Higher Order Differential Attack Using Chosen Higher Order Differences
SAC '98 Proceedings of the Selected Areas in Cryptography
SAC '98 Proceedings of the Selected Areas in Cryptography
Efficient Evaluation of Security against Generalized Interpolation Attack
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Higher Order Differential Attack of Camellia (II)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Essential Algebraic Structure within the AES
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Cryptographic Functions and Design Criteria for Block Ciphers
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
In How Many Ways Can You Write Rijndael?
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Higher Order Differential Attak of CAST Cipher
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
A Revised Version of Crypton - Crypton V1.0
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
On the Interpolation Attacks on Block Ciphers
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Impossible Differential Cryptanalysis of Zodiac
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
A New Keystream Generator MUGI
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Interpolation Attacks of the Block Cipher: SNAKE
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Root Finding Interpolation Attack
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Concatenating Indicators of Flats for Designing Cryptographic Functions
Designs, Codes and Cryptography
Affine equivalence in the AES round function
Discrete Applied Mathematics
A Framework for Describing Block Cipher Cryptanalysis
IEEE Transactions on Computers
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks
Computer Standards & Interfaces
Projective aspects of the AES inversion
Designs, Codes and Cryptography
Impossible differential cryptanalysis of reduced-round ARIA and Camellia
Journal of Computer Science and Technology
Differential fault analysis on the ARIA algorithm
Information Sciences: an International Journal
MAME: A Compression Function with Reduced Hardware Requirements
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
3D: A Three-Dimensional Block Cipher
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Cube Attacks on Tweakable Black Box Polynomials
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Affine equivalence in the AES round function
Discrete Applied Mathematics
Differential properties of power functions
International Journal of Information and Coding Theory
Design of SAC/PC(l) of order k boolean functions and three other cryptographic criteria
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Resistance against general iterated attacks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An optimized algebraic method for higher order differential attack
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
New constructions for resilient and highly nonlinear boolean functions
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
WISA'07 Proceedings of the 8th international conference on Information security applications
Another look at complementation properties
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Cryptanalysis of a generalized unbalanced feistel network structure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
FOX: a new family of block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Amplifying side-channel attacks with techniques from block cipher cryptanalysis
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
SEA: a scalable encryption algorithm for small embedded applications
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A fast calculus for the linearizing attack and its application to an attack on KASUMI
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
HIGHT: a new block cipher suitable for low-resource device
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Block ciphers sensitive to gröbner basis attacks
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
The inverse s-box, non-linear polynomial relations and cryptanalysis of block ciphers
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Improved rijndael-like s-box and its transform domain analysis
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Parallelizing the camellia and SMS4 block ciphers
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
On exact algebraic [non-]immunity of s-boxes based on power functions
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
An algebraic masking method to protect AES against power attacks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Integral cryptanalysis of reduced FOX block cipher
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Impossible-differential attacks on large-block Rijndael
ISC'07 Proceedings of the 10th international conference on Information Security
A new method to determine algebraic expression of power mapping based S-boxes
Information Processing Letters
Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4
International Journal of Applied Cryptography
S-box construction from non-permutation power functions
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |