Search dblp for Publications

export results for "toc:db/journals/tosc/tosc2018.bht:"

 download as .bib file

@article{DBLP:journals/tosc/0001018,
  author       = {Ling Song and
                  Jian Guo},
  title        = {Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using {MILP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {182--214},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.182-214},
  doi          = {10.13154/TOSC.V2018.I3.182-214},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/0001018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AlfaranoBIKL18,
  author       = {Gianira N. Alfarano and
                  Christof Beierle and
                  Takanori Isobe and
                  Stefan K{\"{o}}lbl and
                  Gregor Leander},
  title        = {ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations
                  for Midori and Skinny},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {20--47},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.20-47},
  doi          = {10.13154/TOSC.V2018.I2.20-47},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/AlfaranoBIKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikBLT18,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Atul Luykx and
                  Elmar Tischhauser},
  title        = {{SUNDAE:} Small Universal Deterministic Authenticated Encryption for
                  the Internet of Things},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {1--35},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.1-35},
  doi          = {10.13154/TOSC.V2018.I3.1-35},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikBLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikMAIMBWR18,
  author       = {Subhadeep Banik and
                  Vasily Mikhalev and
                  Frederik Armknecht and
                  Takanori Isobe and
                  Willi Meier and
                  Andrey Bogdanov and
                  Yuhei Watanabe and
                  Francesco Regazzoni},
  title        = {Towards Low Energy Stream Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {1--19},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.1-19},
  doi          = {10.13154/TOSC.V2018.I2.1-19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikMAIMBWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGW18,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Lei Wang},
  title        = {Functional Graphs and Their Applications in Generic Attacks on Iterated
                  Hash Constructions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {201--253},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.201-253},
  doi          = {10.13154/TOSC.V2018.I1.201-253},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeierleCL18,
  author       = {Christof Beierle and
                  Anne Canteaut and
                  Gregor Leander},
  title        = {Nonlinear Approximations in Cryptanalysis Revisited},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {80--101},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.80-101},
  doi          = {10.13154/TOSC.V2018.I4.80-101},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BeierleCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BhattacharyaN18,
  author       = {Srimanta Bhattacharya and
                  Mridul Nandi},
  title        = {Revisiting Variable Output Length {XOR} Pseudorandom Function},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {314--335},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.314-335},
  doi          = {10.13154/TOSC.V2018.I1.314-335},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BhattacharyaN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BihamP18,
  author       = {Eli Biham and
                  Stav Perle},
  title        = {Conditional Linear Cryptanalysis - Cryptanalysis of {DES} with Less
                  Than 242 Complexity},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {215--264},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.215-264},
  doi          = {10.13154/TOSC.V2018.I3.215-264},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BihamP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BogdanovTV18,
  author       = {Andrey Bogdanov and
                  Elmar Tischhauser and
                  Philip S. Vejre},
  title        = {Multivariate Profiling of Hulls for Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {101--125},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.101-125},
  doi          = {10.13154/TOSC.V2018.I1.101-125},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BogdanovTV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouillaguetDF18,
  author       = {Charles Bouillaguet and
                  Claire Delaplace and
                  Pierre{-}Alain Fouque},
  title        = {Revisiting and Improving Algorithms for the 3XOR Problem},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {254--276},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.254-276},
  doi          = {10.13154/TOSC.V2018.I1.254-276},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BouillaguetDF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouraC18,
  author       = {Christina Boura and
                  Anne Canteaut},
  title        = {On the Boomerang Uniformity of Cryptographic Sboxes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {290--310},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.290-310},
  doi          = {10.13154/TOSC.V2018.I3.290-310},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BouraC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGGJRS18,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Ling Song},
  title        = {Key-Recovery Attacks on Full Kravatte},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {5--28},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.5-28},
  doi          = {10.13154/TOSC.V2018.I1.5-28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CrowleyB18,
  author       = {Paul Crowley and
                  Eric Biggers},
  title        = {Adiantum: length-preserving encryption for entry-level processors},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {39--61},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.39-61},
  doi          = {10.13154/TOSC.V2018.I4.39-61},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CrowleyB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenHAK18,
  author       = {Joan Daemen and
                  Seth Hoffert and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {The design of Xoodoo and Xoofff},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {1--38},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.1-38},
  doi          = {10.13154/TOSC.V2018.I4.1-38},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenHAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenMA18,
  author       = {Joan Daemen and
                  Bart Mennink and
                  Gilles Van Assche},
  title        = {Sound Hashing Modes of Arbitrary Functions, Permutations, and Block
                  Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {197--228},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.197-228},
  doi          = {10.13154/TOSC.V2018.I4.197-228},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DattaDN018,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Goutam Paul},
  title        = {Double-block Hash-then-Sum: {A} Paradigm for Constructing {BBB} Secure
                  {PRF}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {36--92},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.36-92},
  doi          = {10.13154/TOSC.V2018.I3.36-92},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DattaDN018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezISSTWW18,
  author       = {Patrick Derbez and
                  Tetsu Iwata and
                  Ling Sun and
                  Siwei Sun and
                  Yosuke Todo and
                  Haoyang Wang and
                  Meiqin Wang},
  title        = {Cryptanalysis of {AES-PRF} and Its Dual},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {161--191},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.161-191},
  doi          = {10.13154/TOSC.V2018.I2.161-191},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezISSTWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DuvalL18,
  author       = {S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent},
  title        = {{MDS} Matrices with Lightweight Circuits},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {48--78},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.48-78},
  doi          = {10.13154/TOSC.V2018.I2.48-78},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DuvalL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/EichlsederK18,
  author       = {Maria Eichlseder and
                  Daniel Kales},
  title        = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {111--132},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.111-132},
  doi          = {10.13154/TOSC.V2018.I2.111-132},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/EichlsederK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FauskangerS18,
  author       = {Stian Fauskanger and
                  Igor A. Semaev},
  title        = {Separable Statistics and Multidimensional Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {79--110},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.79-110},
  doi          = {10.13154/TOSC.V2018.I2.79-110},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FauskangerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FehrKM18,
  author       = {Serge Fehr and
                  Pierre Karpman and
                  Bart Mennink},
  title        = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {336--352},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.336-352},
  doi          = {10.13154/TOSC.V2018.I1.336-352},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FehrKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FuhrNR18,
  author       = {Thomas Fuhr and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yann Rotella},
  title        = {State-Recovery Attacks on Modified Ketje Jr},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {29--56},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.29-56},
  doi          = {10.13154/TOSC.V2018.I1.29-56},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FuhrNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GhoshalSPDPM18,
  author       = {Ashrujit Ghoshal and
                  Rajat Sadhukhan and
                  Sikhar Patranabis and
                  Nilanjan Datta and
                  Stjepan Picek and
                  Debdeep Mukhopadhyay},
  title        = {Lightweight and Side-channel Secure 4 {\texttimes} 4 S-Boxes from
                  Cellular Automata Rules},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {311--334},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.311-334},
  doi          = {10.13154/TOSC.V2018.I3.311-334},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GhoshalSPDPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Grassi18,
  author       = {Lorenzo Grassi},
  title        = {Mixture Differential Cryptanalysis: a New Approach to Distinguishers
                  and Attacks on round-reduced {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {133--160},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.133-160},
  doi          = {10.13154/TOSC.V2018.I2.133-160},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Grassi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Hall-AndersenV18,
  author       = {Mathias Hall{-}Andersen and
                  Philip S. Vejre},
  title        = {Generating Graphs Packed with Paths Estimation of Linear Approximations
                  and Differentials},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {265--289},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.265-289},
  doi          = {10.13154/TOSC.V2018.I3.265-289},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Hall-AndersenV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HuangW18,
  author       = {Tao Huang and
                  Hongjun Wu},
  title        = {Distinguishing Attack on {NORX} Permutation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {57--73},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.57-73},
  doi          = {10.13154/TOSC.V2018.I1.57-73},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HuangW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KandeleP18,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  title        = {Key Assignment Scheme with Authenticated Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {150--196},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.150-196},
  doi          = {10.13154/TOSC.V2018.I4.150-196},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KandeleP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LachariteP18,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Kenneth G. Paterson},
  title        = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically
                  encrypted data},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {277--313},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.277-313},
  doi          = {10.13154/TOSC.V2018.I1.277-313},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LachariteP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LeanderTW18,
  author       = {Gregor Leander and
                  Cihangir Tezcan and
                  Friedrich Wiemer},
  title        = {Searching for Subspace Trails and Truncated Differentials},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {74--100},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.74-100},
  doi          = {10.13154/TOSC.V2018.I1.74-100},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LeanderTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiTYW18,
  author       = {Yongqiang Li and
                  Shizhu Tian and
                  Yuyin Yu and
                  Mingsheng Wang},
  title        = {On the Generalization of Butterfly Structure},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {160--179},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.160-179},
  doi          = {10.13154/TOSC.V2018.I1.160-179},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiTYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MendelN18,
  author       = {Florian Mendel and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Preface to Volume 2018, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.1-4},
  doi          = {10.13154/TOSC.V2018.I1.1-4},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MendelN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Mennink18,
  author       = {Bart Mennink},
  title        = {Key Prediction Security of Keyed Sponges},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {128--149},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.128-149},
  doi          = {10.13154/TOSC.V2018.I4.128-149},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Mennink18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/RechbergerST18,
  author       = {Christian Rechberger and
                  Hadi Soleimany and
                  Tyge Tiessen},
  title        = {Cryptanalysis of Low-Data Instances of Full LowMCv2},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {163--181},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.163-181},
  doi          = {10.13154/TOSC.V2018.I3.163-181},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/RechbergerST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SadeghiMB18,
  author       = {Sadegh Sadeghi and
                  Tahereh Mohammadi and
                  Nasour Bagheri},
  title        = {Cryptanalysis of Reduced round {SKINNY} Block Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {124--162},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.124-162},
  doi          = {10.13154/TOSC.V2018.I3.124-162},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SadeghiMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SahaR018,
  author       = {Dhiman Saha and
                  Mostafizar Rahman and
                  Goutam Paul},
  title        = {New Yoyo Tricks with AES-based Permutations},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {102--127},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.102-127},
  doi          = {10.13154/TOSC.V2018.I4.102-127},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SahaR018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/StoffelenD18,
  author       = {Ko Stoffelen and
                  Joan Daemen},
  title        = {Column Parity Mixers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {126--159},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.126-159},
  doi          = {10.13154/TOSC.V2018.I1.126-159},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/StoffelenD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Sun0W18,
  author       = {Ling Sun and
                  Wei Wang and
                  Meiqin Wang},
  title        = {More Accurate Differential Properties of {LED64} and Midori64},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {93--123},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.93-123},
  doi          = {10.13154/TOSC.V2018.I3.93-123},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Sun0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WeiYWP18,
  author       = {Yongzhuang Wei and
                  Tao Ye and
                  Wenling Wu and
                  Enes Pasalic},
  title        = {Generalized Nonlinear Invariant Attack and a New Design Criterion
                  for Round Constants},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {62--79},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.62-79},
  doi          = {10.13154/TOSC.V2018.I4.62-79},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/WeiYWP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhouWS18,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yiru Sun},
  title        = {On Efficient Constructions of Lightweight {MDS} Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {180--200},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.180-200},
  doi          = {10.13154/TOSC.V2018.I1.180-200},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhouWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics