The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase block-ciphers (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1992 (17) 1993-1996 (20) 1997-1998 (36) 1999-2000 (40) 2001 (25) 2002 (25) 2003 (36) 2004 (47) 2005 (38) 2006 (52) 2007 (47) 2008 (57) 2009 (50) 2010 (25) 2011 (18) 2012 (41) 2013 (40) 2014 (38) 2015 (47) 2016 (37) 2017 (54) 2018 (47) 2019 (42) 2020 (62) 2021 (34) 2022 (42) 2023 (46) 2024 (7)
Publication types (Num. hits)
article(442) book(1) incollection(13) inproceedings(578) phdthesis(36)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 634 occurrences of 233 keywords

Results
Found 1070 publication records. Showing 1070 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan Controlled Operations as a Cryptographic Primitive. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
22Howard M. Heys, Liang Zhang Pipelined Statistical Cipher Feedback: A New Mode for High-Speed Self-Synchronizing Stream Encryption. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Cryptography, synchronization, stream ciphers, block ciphers, advanced encryption standard (AES), mode of operation, error propagation
22A. A. Adekunle, S. R. Woodhead Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF integrity, block ciphers, information security, message authentication, ubiquitous networks
22Eyal Kaplan, Moni Naor, Omer Reingold Derandomized Constructions of k-Wise (Almost) Independent Permutations. Search on Bibsonomy Algorithmica The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Card shuffling, Connectivity, Block ciphers, Random walk, Pseudo-randomness
22Yuriy I. Izbenko, Vladyslav Kovtun, Alexandr Kuznetsov The Design of Boolean Functions by Modified Hill Climbing Method. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Boolean functions, stream ciphers, block ciphers, autocorrelation, hill climbing, balancedness, non-linearity, bent function
22Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park A New Double-Block-Length Hash Function Using Feistel Structure. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Ciphers, Hash Function, Double Block Length Hash Function
22Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang Update on SEED: SEED-192/256. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Ciphers, SEED
22Jongsung Kim, Raphael C.-W. Phan A Cryptanalytic View of the NSA's Skipjack Block Cipher Design. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Skipjack, NSA, Cryptanalysis, Block Ciphers, Distinguisher
22Ewan Fleischmann, Michael Gorski, Stefan Lucks Attacking 9 and 10 Rounds of AES-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
22Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Generalized Unbalanced Feistel Network, Differential Probability, Linear Hull Probability, Block Ciphers
22Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF linear hulls, algebraic analysis, systems of sparse polynomial equations of low degree, RFID, block ciphers
22Marine Minier, Raphael C.-W. Phan, Benjamin Pousse Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF known-key distinguishers, cryptanalysis, Block ciphers, Rijndael
22Ali Aydin Selçuk On Probability of Success in Linear and Differential Cryptanalysis. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Success probability, Block ciphers, Differential cryptanalysis, Linear cryptanalysis, Order statistics
22Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 Algebraic and Slide Attacks on KeeLoq. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unbalanced Feistel ciphers, Gröbner bases, KeeLoq, block ciphers, SAT solvers, algebraic cryptanalysis, slide attacks
22Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel A Practical Attack on KeeLoq. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF KeeLoq, cryptanalysis, block ciphers, slide attacks, meet-in-the-middle attacks
22Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multidimensional Linear Approximation, Block Ciphers, Linear Cryptanalysis, Serpent
22Michael Gorski, Stefan Lucks New Related-Key Boomerang Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
22Sarah M. Diesburg, Christopher R. Meyers, David M. Lary, An-I Andy Wang When cryptography meets storage. Search on Bibsonomy StorageSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF modes of encryption, two-time pads, block ciphers, storage, bloom filters
22Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations
22Goce Jakimoski, K. P. Subbalakshmi On Efficient Message Authentication Via Block Cipher Design Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions
22Jongsung Kim, Seokhie Hong, Bart Preneel Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack
22Yannick Seurin, Thomas Peyrin Security Analysis of Constructions Combining FIL Random Oracles. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF block ciphers, hash functions, provable security, random oracle, compression functions
22Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim 0001 Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Eagle-64, Eagle-128, Related-key Amplified Boomerang Attack, Block Ciphers, Data-Dependent Operations
22Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann Analysis of the SMS4 Block Cipher. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF UFN, cryptanalysis, block ciphers, algebraic structure
22Nicolas T. Courtois, Gregory V. Bard Algebraic Cryptanalysis of the Data Encryption Standard. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF s5DES, solving overdefined and sparse systems of multivariate equations, ElimLin algorithm, Gröbner bases, logical cryptanalysis, block ciphers, AES, DES, SAT solvers, algebraic cryptanalysis
22Bruno Robisson, Pascal Manet Differential Behavioral Analysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Differential Behavioral Analysis, Safe-Error, Block Ciphers, AES, Differential Power Analysis, Fault Attacks
22Rogelio Hasimoto-Beltrán, Edmar Mota-Garcia Real-Time Secure Multimedia Communication System Based on Chaos Theory. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Discrete chaotic encryption, Block ciphers, symmetric encryption
22Alexander A. Moldovyan, Nick A. Moldovyan, Nicolas Sklavos 0001 Controlled elements for designing ciphers suitable to efficient VLSI implementation. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Block ciphers, Hardware implementation, Data-dependent operations
22Dragos Trinca Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel algorithms, Block ciphers, Convolutional codes, Symmetric encryption
22Otokar Grosek, Peter Horák, Tran van Trung On Non-Polynomial Latin Squares. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block ciphers, polynomial approximation, Latin squares
22Peter Hellekalek, Stefan Wegenkittl Empirical evidence concerning AES. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block ciphers, AES, diffusion, statistical tests, confusion
22Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz OCB: a block-cipher mode of operation for efficient authenticated encryption. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation
22Simon R. Blackburn, Sean Murphy, Kenneth G. Paterson Comments on "Theory and Applications of Cellular Automata in Cryptography". Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1997 DBLP  DOI  BibTeX  RDF affine group, Cryptography, stream ciphers, cellular automata, block ciphers
22Howard M. Heys, Stafford E. Tavares Avalanche Characteristics of Substitution-Permutation Encryption Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Avalanche, substitution-permutation encryption networks, cryptography, block ciphers, S-boxes
22Sukumar Nandi, B. K. Kar, Parimal Pal Chaudhuri Theory and Applications of Cellular Automata in Cryptography. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1994 DBLP  DOI  BibTeX  RDF CA state transitions, fundamental transformations, programmable cellular automata, pseudorandom pattern generators, VLSI, cryptography, cryptography, stream ciphers, cellular automata, cellular automata, block ciphers, random number generation, VLSI implementation
20Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
20Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi Optimized Self-Synchronizing Mode of Operation. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Dong Hyeon Cheon, Sangjin Lee 0002, Jong In Lim 0001, Sung Jae Lee New Block Cipher DONUT Using Pairwise Perfect Decorrelation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation
19Claude Carlet On the Higher Order Nonlinearities of Boolean Functions and S-boxes. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Josef Scharinger Kolmogorov Stream Ciphers. Search on Bibsonomy EUROCAST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Christos Strydis, Di Zhu, Georgi Gaydadjiev Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF implantable devices, microarchitectural profiling, symmetric encryption, ultra-low power
19Philipp Grabher, Johann Großschädl, Dan Page Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Jin-Song Wang, Wen-Feng Qi 0001 Linear Equation on Polynomial Single Cycle T-Functions. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF single cycle, pseudorandom generator, polynomial function
19Frédéric Muller, Thomas Peyrin Cryptanalysis of T-Function-Based Hash Functions. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Alexander Maximov, Thomas Johansson 0001 Fast Computation of Large Distributions and Its Cryptographic Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Magnus Daum Narrow T-Functions. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Bo-Yin Yang, Jiun-Ming Chen Theoretical Analysis of XL over Small Fields. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Julio César Hernández Castro, José María Sierra, André Seznec The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Alexander Klimov, Adi Shamir Cryptographic Applications of T-Functions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Joanne Fuller, William Millan Linear Redundancy in S-Boxes. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Kishan Chand Gupta, Palash Sarkar 0001 Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF bilinear form, symplectic matrix, nonlinearity, S-box, bent function, symmetric ciphers, SAC
19Zhijie Shi, Xiao Yang 0001, Ruby B. Lee Arbitrary Bit Permutations in One or Two Cycles. Search on Bibsonomy ASAP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi Cryptanalysis of DES Implemented on Computers with Cache. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Ulrich Kühn 0001 Cryptanalysis of Reduced-Round MISTY. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Joan Daemen, Michaël Peeters, Gilles Van Assche Bitslice Ciphers and Power Analysis Attacks. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Sandy Harris, Carlisle M. Adams Key-Dependent S-Box Manipulations. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Bart Preneel An Introduction to Cryptology. Search on Bibsonomy SOFSEM The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Bart Preneel, Vincent Rijmen, Antoon Bosselaers Recent Developments in the Design of Conventional Cryptographic Algorithms. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
19Carlo Harpes, Gerhard Kramer, James L. Massey A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF piling-up lemma, SAFER K-64, differential cryptanalysis, Linear cryptanalysis, IDEA
19Kaisa Nyberg On the Construction of Highly Nonlinear Permutations. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
19Willi Meier, Othmar Staffelbach Nonlinearity Criteria for Cryptographic Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
18Pu Sun, Fu Song, Yuqi Chen 0001, Taolue Chen EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis. Search on Bibsonomy Proc. ACM Program. Lang. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Razi Arshad, Mudassar Jalil Comment to "A projective general linear group-based algorithm for the construction of substitution box for block ciphers". Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Fen Liu, Yongqiang Li 0001, Huiqin Chen, Lin Jiao, Ming Luo, Mingsheng Wang YuX: Finite Field Multiplication Based Block Ciphers for Efficient FHE Evaluation. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Tianren Liu, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Tran Thi Luong, Linh Hoang Dinh On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Wei Jie Ng, Chik How Tan Depth-measurement trade-off for quantum search on block ciphers. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Jinyu Lu, Guoqiang Liu, Bing Sun 0001, Chao Li 0002, Li Liu 0002 Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Zhenzhen Guo, Gaoli Wang, Orr Dunkelman, Yinxue Pan, Shengyuan Liu Tweakable SM4: How to tweak SM4 into tweakable block ciphers? Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Weijian Teng, Je Sen Teh, Norziana Jamil On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and SLIM. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hayato Kimura 0002, Keita Emura, Takanori Isobe 0001, Ryoma Ito 0001, Kazuto Ogawa, Toshihiro Ohigashi A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers. Search on Bibsonomy J. Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Bahram Rashidi Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Abdullah Sevin, Abdu Ahmed Osman Mohammed A survey on software implementation of lightweight block ciphers for IoT devices. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18R. Anusha, Raghavendra Rao P, Pratheksha Rai N Secured Authentication of RFID Devices Using Lightweight Block Ciphers on FPGA Platforms. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Chaoen Xiao, Guangyue Zhao, Lei Zhang, Ding Ding A Controllable Pipeline Framework of Block Ciphers on GPU for Streaming Data. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yongryeol Choi, Hojin Choi, Seog Chung Seo AVX512Crypto: Parallel Implementations of Korean Block Ciphers Using AVX-512. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Dongyoung Roh Validity of Differential Characteristics of ARX Block Ciphers. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Vincenzo Agate, Federico Concone, Alessandra De Paola, Pierluca Ferraro, Giuseppe Lo Re, Marco Morana Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Apeksha Kamble, Zeesha Mishra, Bibhudendra Acharya Hardware implementations of LBlock and XXTEA lightweight block ciphers for resource-constrained IoT application. Search on Bibsonomy Int. J. High Perform. Syst. Archit. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18 Retraction Note: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zhangjun Ma, Manman Li, Shaozhen Chen Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lang Li, Yu Ou A deep learning-based side channel attack model for different block ciphers. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zehong (Zephyr) Qiu, Fan Zhang 0010 RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Osmani Tito-Corrioso, Mijail Borges-Quintana, Miguel A. Borges-Trenard, Omar Rojas, Guillermo Sosa Gómez On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hyunji Kim, Sejin Lim, Yeajun Kang, Wonwoong Kim, Dukyoung Kim, Seyoung Yoon, Hwajeong Seo Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Senpeng Wang, Dengguo Feng, Bin Hu 0011, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang 0026 New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Xichao Hu, Yongqiang Li 0001, Lin Jiao, Zhengbin Liu, Mingsheng Wang Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Yukun Cheng, Changhai Ou, Fan Zhang 0010, Shihui Zheng DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18André Schrottenloher, Marc Stevens 0001 Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe 0001, Mitsugu Iwamoto, Kazuo Sakiyama Abstraction Model of Probing and DFA Attacks on Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Amit Jana, Mostafizar Rahman, Dhiman Saha, Goutam Paul 0001 Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Muhammad Rana, Quazi Mamun, Rafiqul Islam 0002 Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mir Nazish, M. Tariq Banday, Insha Syed, Sheena Banday An efficient permutation approach for SbPN-based symmetric block ciphers. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Anit Kumar Ghosal, Dipanwita Roychowdhury Continuously non-malleable codes from block ciphers in split-state model. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hong-Wei Sun, Chun-Yan Wei, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao 0001 Improved BV-based quantum attack on block ciphers. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1070 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license