Showing 21 - 40 results of 53 for search '"Asiacrypt"', query time: 0.81s Refine Results
  1. 21
    ... budget such as handheld devices or RFID tags. At Asiacrypt 2015, Banik et al. presented the block cipher...
    Get full text
    Article
  2. 22
    ...We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015...
    Get full text
    Article
  3. 23
    by Li Lin, Wenling Wu
    Published 2017-03-01
    ...Midori is a lightweight block cipher designed by Banik et al. at ASIACRYPT 2015 to achieve low...
    Get full text
    Article
  4. 24
    by Gaoli Wang, Yanzhao Shen, Fukang Liu
    Published 2017-06-01
    ... path constructed by Mendel et al. at ASIACRYPT 2013. The experiments confirm our reasoning...
    Get full text
    Article
  5. 25
    by Mostafizar Rahman, Dhiman Saha, Goutam Paul
    Published 2021-09-01
    ... 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017. In doing so, the s-box switch and ladder...
    Get full text
    Article
  6. 26
    by Yan Huang, Fangguo Zhang, Zhijie Liu, Huang Zhang
    Published 2019-01-01
    ... (AsiaCrypt 2017) and Yoo's scheme (FC 2017). The structure of our scheme follows that of the hash-based...
    Get full text
    Article
  7. 27
    ... 2018 and Asiacrypt 2019 respectively. They use the fact that the entire internal state can be split...
    Get full text
    Article
  8. 28
    by Xiaoyang Dong, Xiaoyun Wang
    Published 2016-12-01
    ...Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model...
    Get full text
    Article
  9. 29
    by Jung-Keun Lee, Woo-Hwan Kim
    Published 2020-01-01
    ... or better complexity compared to those presented at ASIACRYPT 2017 that use 4 additional trails. With data...
    Get full text
    Article
  10. 30
    ... 2018 and Asiacrypt 2019 respectively. They use the fact that the entire internal state can be split...
    Get full text
    Article
  11. 31
    ..., they can resist attacks put forward by Belaid et al. (ASIACRYPT 2014), satisfy some relevant cryptographic...
    Get full text
    Article
  12. 32
    ..., they can resist attacks put forward by Belaid et al. (ASIACRYPT 2014), satisfy some relevant cryptographic...
    Get full text
    Article
  13. 33
    ... and verification functionality, and has more power in breaking the scheme. Andreeva et al. (ASIACRYPT 2014...
    Get full text
    Article
  14. 34
    by Muzhou Li, Kai Hu, Meiqin Wang
    Published 2019-03-01
    ... (Tweak Difference Invariant Bias) ones. KDIB cryptanalysis was proposed by Bogdanov et al. at ASIACRYPT...
    Get full text
    Article
  15. 35
    by Dhiman Saha, Mostafizar Rahman, Goutam Paul
    Published 2018-12-01
    ... In Asiacrypt 2017, Rønjom et al. reported some interesting generic properties of SPNs, leading...
    Get full text
    Article
  16. 36
    by Akira Takahashi, Mehdi Tibouchi, Masayuki Abe
    Published 2018-08-01
    ... present new fault attacks against the qDSA signature scheme of Renes and Smith (ASIACRYPT 2017) when...
    Get full text
    Article
  17. 37
    by Jihoon Kwon, Seog Chung Seo, Seokhie Hong
    Published 2018-05-01
    ... Ted 127 - glv 4 on 8-bit AVR, 16-bit MSP430, and 32-bit ARM processors. In Asiacrypt 2012...
    Get full text
    Article
  18. 38
    ... scheme of Cheon et al. (ASIACRYPT 2017) for an efficient arithmetic over real numbers, and devise a new...
    Get full text
    Article
  19. 39
    ... are the ciphers Midori (Asiacrypt’15) and Sprout (FSE’15). This may on the one hand help to save resources...
    Get full text
    Article
  20. 40
    ..., especially for short messages. Reyhanitabar, Vaudenay and Vizár (Asiacrypt 2016) gave a formal treatment...
    Get full text
    Article