-
21by Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni“... budget such as handheld devices or RFID tags. At Asiacrypt 2015, Banik et al. presented the block cipher...”
Published 2018-06-01
Get full text
Article -
22“...We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015...”
Get full text
Article -
23“...Midori is a lightweight block cipher designed by Banik et al. at ASIACRYPT 2015 to achieve low...”
Get full text
Article -
24“... path constructed by Mendel et al. at ASIACRYPT 2013. The experiments confirm our reasoning...”
Get full text
Article -
25“... 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017. In doing so, the s-box switch and ladder...”
Get full text
Article -
26“... (AsiaCrypt 2017) and Yoo's scheme (FC 2017). The structure of our scheme follows that of the hash-based...”
Get full text
Article -
27“... 2018 and Asiacrypt 2019 respectively. They use the fact that the entire internal state can be split...”
Get full text
Article -
28Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes“...Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model...”
Get full text
Article -
29“... or better complexity compared to those presented at ASIACRYPT 2017 that use 4 additional trails. With data...”
Get full text
Article -
30“... 2018 and Asiacrypt 2019 respectively. They use the fact that the entire internal state can be split...”
Get full text
Article -
31“..., they can resist attacks put forward by Belaid et al. (ASIACRYPT 2014), satisfy some relevant cryptographic...”
Get full text
Article -
32“..., they can resist attacks put forward by Belaid et al. (ASIACRYPT 2014), satisfy some relevant cryptographic...”
Get full text
Article -
33by Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras“... and verification functionality, and has more power in breaking the scheme. Andreeva et al. (ASIACRYPT 2014...”
Published 2020-01-01
Get full text
Article -
34“... (Tweak Difference Invariant Bias) ones. KDIB cryptanalysis was proposed by Bogdanov et al. at ASIACRYPT...”
Get full text
Article -
35“... In Asiacrypt 2017, Rønjom et al. reported some interesting generic properties of SPNs, leading...”
Get full text
Article -
36“... present new fault attacks against the qDSA signature scheme of Renes and Smith (ASIACRYPT 2017) when...”
Get full text
Article -
37“... Ted 127 - glv 4 on 8-bit AVR, 16-bit MSP430, and 32-bit ARM processors. In Asiacrypt 2012...”
Get full text
Article -
38“... scheme of Cheon et al. (ASIACRYPT 2017) for an efficient arithmetic over real numbers, and devise a new...”
Get full text
Article -
39“... are the ciphers Midori (Asiacrypt’15) and Sprout (FSE’15). This may on the one hand help to save resources...”
Get full text
Article -
40“..., especially for short messages. Reyhanitabar, Vaudenay and Vizár (Asiacrypt 2016) gave a formal treatment...”
Get full text
Article