Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tosc/tosc2018.bht:"
@article{DBLP:journals/tosc/0001018, author = {Ling Song and Jian Guo}, title = {Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using {MILP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {182--214}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.182-214}, doi = {10.13154/TOSC.V2018.I3.182-214}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/0001018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AlfaranoBIKL18, author = {Gianira N. Alfarano and Christof Beierle and Takanori Isobe and Stefan K{\"{o}}lbl and Gregor Leander}, title = {ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {20--47}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.20-47}, doi = {10.13154/TOSC.V2018.I2.20-47}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/AlfaranoBIKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikBLT18, author = {Subhadeep Banik and Andrey Bogdanov and Atul Luykx and Elmar Tischhauser}, title = {{SUNDAE:} Small Universal Deterministic Authenticated Encryption for the Internet of Things}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {1--35}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.1-35}, doi = {10.13154/TOSC.V2018.I3.1-35}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BanikBLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikMAIMBWR18, author = {Subhadeep Banik and Vasily Mikhalev and Frederik Armknecht and Takanori Isobe and Willi Meier and Andrey Bogdanov and Yuhei Watanabe and Francesco Regazzoni}, title = {Towards Low Energy Stream Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {1--19}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.1-19}, doi = {10.13154/TOSC.V2018.I2.1-19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BanikMAIMBWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGW18, author = {Zhenzhen Bao and Jian Guo and Lei Wang}, title = {Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {201--253}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.201-253}, doi = {10.13154/TOSC.V2018.I1.201-253}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeierleCL18, author = {Christof Beierle and Anne Canteaut and Gregor Leander}, title = {Nonlinear Approximations in Cryptanalysis Revisited}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {80--101}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.80-101}, doi = {10.13154/TOSC.V2018.I4.80-101}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BeierleCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BhattacharyaN18, author = {Srimanta Bhattacharya and Mridul Nandi}, title = {Revisiting Variable Output Length {XOR} Pseudorandom Function}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {314--335}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.314-335}, doi = {10.13154/TOSC.V2018.I1.314-335}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BhattacharyaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BihamP18, author = {Eli Biham and Stav Perle}, title = {Conditional Linear Cryptanalysis - Cryptanalysis of {DES} with Less Than 242 Complexity}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {215--264}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.215-264}, doi = {10.13154/TOSC.V2018.I3.215-264}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BihamP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BogdanovTV18, author = {Andrey Bogdanov and Elmar Tischhauser and Philip S. Vejre}, title = {Multivariate Profiling of Hulls for Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {101--125}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.101-125}, doi = {10.13154/TOSC.V2018.I1.101-125}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BogdanovTV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouillaguetDF18, author = {Charles Bouillaguet and Claire Delaplace and Pierre{-}Alain Fouque}, title = {Revisiting and Improving Algorithms for the 3XOR Problem}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {254--276}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.254-276}, doi = {10.13154/TOSC.V2018.I1.254-276}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BouillaguetDF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouraC18, author = {Christina Boura and Anne Canteaut}, title = {On the Boomerang Uniformity of Cryptographic Sboxes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {290--310}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.290-310}, doi = {10.13154/TOSC.V2018.I3.290-310}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BouraC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauFGGJRS18, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and Jian Guo and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard and Ling Song}, title = {Key-Recovery Attacks on Full Kravatte}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {5--28}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.5-28}, doi = {10.13154/TOSC.V2018.I1.5-28}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CrowleyB18, author = {Paul Crowley and Eric Biggers}, title = {Adiantum: length-preserving encryption for entry-level processors}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {39--61}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.39-61}, doi = {10.13154/TOSC.V2018.I4.39-61}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CrowleyB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenHAK18, author = {Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer}, title = {The design of Xoodoo and Xoofff}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {1--38}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.1-38}, doi = {10.13154/TOSC.V2018.I4.1-38}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DaemenHAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenMA18, author = {Joan Daemen and Bart Mennink and Gilles Van Assche}, title = {Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {197--228}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.197-228}, doi = {10.13154/TOSC.V2018.I4.197-228}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DaemenMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DattaDN018, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul}, title = {Double-block Hash-then-Sum: {A} Paradigm for Constructing {BBB} Secure {PRF}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {36--92}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.36-92}, doi = {10.13154/TOSC.V2018.I3.36-92}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DattaDN018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DerbezISSTWW18, author = {Patrick Derbez and Tetsu Iwata and Ling Sun and Siwei Sun and Yosuke Todo and Haoyang Wang and Meiqin Wang}, title = {Cryptanalysis of {AES-PRF} and Its Dual}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {161--191}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.161-191}, doi = {10.13154/TOSC.V2018.I2.161-191}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DerbezISSTWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DuvalL18, author = {S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent}, title = {{MDS} Matrices with Lightweight Circuits}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {48--78}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.48-78}, doi = {10.13154/TOSC.V2018.I2.48-78}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DuvalL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/EichlsederK18, author = {Maria Eichlseder and Daniel Kales}, title = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {111--132}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.111-132}, doi = {10.13154/TOSC.V2018.I2.111-132}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/EichlsederK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FauskangerS18, author = {Stian Fauskanger and Igor A. Semaev}, title = {Separable Statistics and Multidimensional Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {79--110}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.79-110}, doi = {10.13154/TOSC.V2018.I2.79-110}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FauskangerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FehrKM18, author = {Serge Fehr and Pierre Karpman and Bart Mennink}, title = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {336--352}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.336-352}, doi = {10.13154/TOSC.V2018.I1.336-352}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FehrKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FuhrNR18, author = {Thomas Fuhr and Mar{\'{\i}}a Naya{-}Plasencia and Yann Rotella}, title = {State-Recovery Attacks on Modified Ketje Jr}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {29--56}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.29-56}, doi = {10.13154/TOSC.V2018.I1.29-56}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FuhrNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GhoshalSPDPM18, author = {Ashrujit Ghoshal and Rajat Sadhukhan and Sikhar Patranabis and Nilanjan Datta and Stjepan Picek and Debdeep Mukhopadhyay}, title = {Lightweight and Side-channel Secure 4 {\texttimes} 4 S-Boxes from Cellular Automata Rules}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {311--334}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.311-334}, doi = {10.13154/TOSC.V2018.I3.311-334}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GhoshalSPDPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Grassi18, author = {Lorenzo Grassi}, title = {Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {133--160}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.133-160}, doi = {10.13154/TOSC.V2018.I2.133-160}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Grassi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Hall-AndersenV18, author = {Mathias Hall{-}Andersen and Philip S. Vejre}, title = {Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {265--289}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.265-289}, doi = {10.13154/TOSC.V2018.I3.265-289}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Hall-AndersenV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HuangW18, author = {Tao Huang and Hongjun Wu}, title = {Distinguishing Attack on {NORX} Permutation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {57--73}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.57-73}, doi = {10.13154/TOSC.V2018.I1.57-73}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HuangW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KandeleP18, author = {Suyash Kandele and Souradyuti Paul}, title = {Key Assignment Scheme with Authenticated Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {150--196}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.150-196}, doi = {10.13154/TOSC.V2018.I4.150-196}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KandeleP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LachariteP18, author = {Marie{-}Sarah Lacharit{\'{e}} and Kenneth G. Paterson}, title = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {277--313}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.277-313}, doi = {10.13154/TOSC.V2018.I1.277-313}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LachariteP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeanderTW18, author = {Gregor Leander and Cihangir Tezcan and Friedrich Wiemer}, title = {Searching for Subspace Trails and Truncated Differentials}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {74--100}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.74-100}, doi = {10.13154/TOSC.V2018.I1.74-100}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LeanderTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiTYW18, author = {Yongqiang Li and Shizhu Tian and Yuyin Yu and Mingsheng Wang}, title = {On the Generalization of Butterfly Structure}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {160--179}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.160-179}, doi = {10.13154/TOSC.V2018.I1.160-179}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiTYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MendelN18, author = {Florian Mendel and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Preface to Volume 2018, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.1-4}, doi = {10.13154/TOSC.V2018.I1.1-4}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MendelN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Mennink18, author = {Bart Mennink}, title = {Key Prediction Security of Keyed Sponges}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {128--149}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.128-149}, doi = {10.13154/TOSC.V2018.I4.128-149}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Mennink18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/RechbergerST18, author = {Christian Rechberger and Hadi Soleimany and Tyge Tiessen}, title = {Cryptanalysis of Low-Data Instances of Full LowMCv2}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {163--181}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.163-181}, doi = {10.13154/TOSC.V2018.I3.163-181}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/RechbergerST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SadeghiMB18, author = {Sadegh Sadeghi and Tahereh Mohammadi and Nasour Bagheri}, title = {Cryptanalysis of Reduced round {SKINNY} Block Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {124--162}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.124-162}, doi = {10.13154/TOSC.V2018.I3.124-162}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SadeghiMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SahaR018, author = {Dhiman Saha and Mostafizar Rahman and Goutam Paul}, title = {New Yoyo Tricks with AES-based Permutations}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {102--127}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.102-127}, doi = {10.13154/TOSC.V2018.I4.102-127}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SahaR018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/StoffelenD18, author = {Ko Stoffelen and Joan Daemen}, title = {Column Parity Mixers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {126--159}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.126-159}, doi = {10.13154/TOSC.V2018.I1.126-159}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/StoffelenD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Sun0W18, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {More Accurate Differential Properties of {LED64} and Midori64}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {93--123}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.93-123}, doi = {10.13154/TOSC.V2018.I3.93-123}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Sun0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WeiYWP18, author = {Yongzhuang Wei and Tao Ye and Wenling Wu and Enes Pasalic}, title = {Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {62--79}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.62-79}, doi = {10.13154/TOSC.V2018.I4.62-79}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/WeiYWP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhouWS18, author = {Lijing Zhou and Licheng Wang and Yiru Sun}, title = {On Efficient Constructions of Lightweight {MDS} Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {180--200}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.180-200}, doi = {10.13154/TOSC.V2018.I1.180-200}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhouWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.