Grassi, Lorenzo; Hao, Yonglin; Rechberger, Christian; Schofnegger, Markus; Walch, Roman; Wang, Qingju Horst meets Fluid-SPN: Griffin for zero-knowledge applications. (English) Zbl 07799268 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 573-606 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{L. Grassi} et al., Lect. Notes Comput. Sci. 14083, 573--606 (2023; Zbl 07799268) Full Text: DOI
Grassi, Lorenzo; Manterola Ayala, Irati; Norberg Hovd, Martha; Øygarden, Morten; Raddum, Håvard; Wang, Qingju Cryptanalysis of symmetric primitives over rings and a key recovery attack on Rubato. (English) Zbl 07799260 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 305-339 (2023). MSC: 94A60 11T06 PDFBibTeX XMLCite \textit{L. Grassi} et al., Lect. Notes Comput. Sci. 14083, 305--339 (2023; Zbl 07799260) Full Text: DOI
Beierle, Christof; Felke, Patrick; Leander, Gregor; Neumann, Patrick; Stennes, Lukas On perfect linear approximations and differentials over two-round SPNs. (English) Zbl 07799257 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 209-239 (2023). MSC: 94A60 68W05 PDFBibTeX XMLCite \textit{C. Beierle} et al., Lect. Notes Comput. Sci. 14083, 209--239 (2023; Zbl 07799257) Full Text: DOI
Grassi, Lorenzo; Khovratovich, Dmitry; Schofnegger, Markus Poseidon2: a faster version of the Poseidon hash function. (English) Zbl 07798834 El Mrabet, Nadia (ed.) et al., Progress in cryptology – AFRICACRYPT 2023. 14th international conference on cryptology in Africa, Sousse, Tunisia, July 19–21, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14064, 177-203 (2023). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{L. Grassi} et al., Lect. Notes Comput. Sci. 14064, 177--203 (2023; Zbl 07798834) Full Text: DOI
Giordani, Ginevra; Grassi, Lorenzo; Onofri, Silvia; Pedicini, Marco Invertible quadratic non-linear functions over \(\mathbb{F}_p^n\) via multiple local maps. (English) Zbl 07798833 El Mrabet, Nadia (ed.) et al., Progress in cryptology – AFRICACRYPT 2023. 14th international conference on cryptology in Africa, Sousse, Tunisia, July 19–21, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14064, 151-176 (2023). MSC: 68Pxx 94A60 PDFBibTeX XMLCite \textit{G. Giordani} et al., Lect. Notes Comput. Sci. 14064, 151--176 (2023; Zbl 07798833) Full Text: DOI
Masure, Loïc; Méaux, Pierrick; Moos, Thorben; Standaert, François-Xavier Effective and efficient masking with low noise using small-Mersenne-prime ciphers. (English) Zbl 07774133 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 596-627 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Masure} et al., Lect. Notes Comput. Sci. 14007, 596--627 (2023; Zbl 07774133) Full Text: DOI
Grassi, Lorenzo; Øygarden, Morten; Schofnegger, Markus; Walch, Roman From Farfalle to Megafono via Ciminion: the PRF Hydra for MPC applications. (English) Zbl 1528.94055 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 255-286 (2023). MSC: 94A60 68P25 68M14 PDFBibTeX XMLCite \textit{L. Grassi} et al., Lect. Notes Comput. Sci. 14007, 255--286 (2023; Zbl 1528.94055) Full Text: DOI
Gao, Yuan; Guo, Chun Provable security of HADES structure. (English) Zbl 1527.94040 Beresford, Alastair R. (ed.) et al., Cryptology and network security. 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13641, 258-276 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Gao} and \textit{C. Guo}, Lect. Notes Comput. Sci. 13641, 258--276 (2022; Zbl 1527.94040) Full Text: DOI
Wang, Shi; Chen, Yuan; Li, Yunqing; Zeng, Xiangyong On construction of lightweight MDS matrices. (English) Zbl 1521.94131 Adv. Math. Commun. 16, No. 4, 1023-1049 (2022). MSC: 94B60 11T71 94A60 68P25 PDFBibTeX XMLCite \textit{S. Wang} et al., Adv. Math. Commun. 16, No. 4, 1023--1049 (2022; Zbl 1521.94131) Full Text: DOI
Da, Qi; Xu, Shanjie; Guo, Chun Sequential indifferentiability of confusion-diffusion networks. (English) Zbl 1514.94071 Adhikari, Avishek (ed.) et al., Progress in cryptology – INDOCRYPT 2021. 22nd International conference on cryptology in India, Jaipur, India, December 12–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13143, 93-113 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Q. Da} et al., Lect. Notes Comput. Sci. 13143, 93--113 (2021; Zbl 1514.94071) Full Text: DOI
Beyne, Tim A geometric approach to linear cryptanalysis. (English) Zbl 1514.94042 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 36-66 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Beyne}, Lect. Notes Comput. Sci. 13090, 36--66 (2021; Zbl 1514.94042) Full Text: DOI
Bordes, Nicolas; Daemen, Joan; Kuijsters, Daniël; Van Assche, Gilles Thinking outside the superbox. (English) Zbl 1487.94104 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 337-367 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Bordes} et al., Lect. Notes Comput. Sci. 12827, 337--367 (2021; Zbl 1487.94104) Full Text: DOI HAL
Agievich, S. V. On the guaranteed number of activations in \(\mathsf{XS}\)-circuits. (English) Zbl 1486.94072 Mat. Vopr. Kriptografii 12, No. 2, 7-20 (2021). MSC: 94A60 05C25 PDFBibTeX XMLCite \textit{S. V. Agievich}, Mat. Vopr. Kriptografii 12, No. 2, 7--20 (2021; Zbl 1486.94072) Full Text: DOI MNR
Beyne, Tim; Dhooghe, Siemen; Zhang, Zhenda Cryptanalysis of masked ciphers: a not so random idea. (English) Zbl 1511.94056 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 817-850 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Beyne} et al., Lect. Notes Comput. Sci. 12491, 817--850 (2020; Zbl 1511.94056) Full Text: DOI
Dunkelman, Orr; Kumar, Abhishek; Lambooij, Eran; Sanadhya, Somitra Kumar Counting active S-boxes is not enough. (English) Zbl 1492.94093 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 332-344 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Dunkelman} et al., Lect. Notes Comput. Sci. 12578, 332--344 (2020; Zbl 1492.94093) Full Text: DOI
Grassi, Lorenzo; Lüftenegger, Reinhard; Rechberger, Christian; Rotaru, Dragos; Schofnegger, Markus On a generalization of substitution-permutation networks: the HADES design strategy. (English) Zbl 1492.94115 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 674-704 (2020). MSC: 94A60 05A05 PDFBibTeX XMLCite \textit{L. Grassi} et al., Lect. Notes Comput. Sci. 12106, 674--704 (2020; Zbl 1492.94115) Full Text: DOI
Beyne, Tim Block cipher invariants as eigenvectors of correlation matrices. (English) Zbl 1457.94099 J. Cryptology 33, No. 3, 1156-1183 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T. Beyne}, J. Cryptology 33, No. 3, 1156--1183 (2020; Zbl 1457.94099) Full Text: DOI
Ankele, Ralph; Kölbl, Stefan Mind the gap – a closer look at the security of block ciphers against differential cryptanalysis. (English) Zbl 1447.94017 Cid, Carlos (ed.) et al., Selected areas in cryptography – SAC 2018. 25th international conference, Calgary, AB, Canada, August 15–17, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11349, 163-190 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ankele} and \textit{S. Kölbl}, Lect. Notes Comput. Sci. 11349, 163--190 (2019; Zbl 1447.94017) Full Text: DOI Link
Liu, Yunwen; Rijmen, Vincent; Leander, Gregor Nonlinear diffusion layers. (English) Zbl 1401.94164 Des. Codes Cryptography 86, No. 11, 2469-2484 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Liu} et al., Des. Codes Cryptography 86, No. 11, 2469--2484 (2018; Zbl 1401.94164) Full Text: DOI Link
Wang, Qian; Jin, Chenhui Upper bound of the length of truncated impossible differentials for AES. (English) Zbl 1391.94810 Des. Codes Cryptography 86, No. 7, 1541-1552 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{Q. Wang} and \textit{C. Jin}, Des. Codes Cryptography 86, No. 7, 1541--1552 (2018; Zbl 1391.94810) Full Text: DOI
Tolba, Mohamed; Abdelkhalek, Ahmed; Youssef, Amr M. Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-128. (English) Zbl 1384.94104 Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 423-441 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Tolba} et al., Lect. Notes Comput. Sci. 10719, 423--441 (2018; Zbl 1384.94104) Full Text: DOI
Lee, Jooyoung; Luykx, Atul; Mennink, Bart; Minematsu, Kazuhiko Connecting tweakable and multi-key blockcipher security. (English) Zbl 1426.94109 Des. Codes Cryptography 86, No. 3, 623-640 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lee} et al., Des. Codes Cryptography 86, No. 3, 623--640 (2018; Zbl 1426.94109) Full Text: DOI
Chang, Donghoon; Ghosh, Mohona; Jati, Arpan; Kumar, Abhishek; Sanadhya, Somitra Kumar eSPF: a family of format-preserving encryption algorithms using MDS matrices. (English) Zbl 1506.94030 Ali, Sk Subidh (ed.) et al., Security, privacy, and applied cryptography engineering. 7th international conference, SPACE 2017, Goa, India, December 13–17, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10662, 133-150 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Chang} et al., Lect. Notes Comput. Sci. 10662, 133--150 (2017; Zbl 1506.94030) Full Text: DOI
Abdelkhalek, Ahmed; Tolba, Mohamed; Youssef, Amr M. Impossible differential attack on reduced round SPARX-64/128. (English) Zbl 1408.94925 Joye, Marc (ed.) et al., Progress in cryptology – AFRICACRYPT 2017. 9th international conference on cryptology in Africa, Dakar, Senegal, May 24–26, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10239, 135-146 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Abdelkhalek} et al., Lect. Notes Comput. Sci. 10239, 135--146 (2017; Zbl 1408.94925) Full Text: DOI
Chang, Donghoon; Ghosh, Mohona; Gupta, Kishan Chand; Jati, Arpan; Kumar, Abhishek; Moon, Dukjae; Ray, Indranil Ghosh; Sanadhya, Somitra Kumar SPF: a new family of efficient format-preserving encryption algorithms. (English) Zbl 1372.94416 Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 64-83 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Chang} et al., Lect. Notes Comput. Sci. 10143, 64--83 (2017; Zbl 1372.94416) Full Text: DOI
Journault, Anthony; Standaert, François-Xavier; Varici, Kerem Improving the security and efficiency of block ciphers based on LS-designs. (English) Zbl 1402.94060 Des. Codes Cryptography 82, No. 1-2, 495-509 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Journault} et al., Des. Codes Cryptography 82, No. 1--2, 495--509 (2017; Zbl 1402.94060) Full Text: DOI HAL
Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian Analysis of the Kupyna-256 hash function. (English) Zbl 1385.94031 Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 575-590 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Dobraunig} et al., Lect. Notes Comput. Sci. 9783, 575--590 (2016; Zbl 1385.94031) Full Text: DOI
Dinu, Daniel; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Großschädl, Johann; Biryukov, Alex Design strategies for ARX with provable bounds: Sparx and LAX. (English) Zbl 1384.94055 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 484-513 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Dinu} et al., Lect. Notes Comput. Sci. 10031, 484--513 (2016; Zbl 1384.94055) Full Text: DOI
Gueron, Shay; Mouha, Nicky Simpira v2: a family of efficient permutations using the AES round function. (English) Zbl 1404.94077 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 95-125 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Gueron} and \textit{N. Mouha}, Lect. Notes Comput. Sci. 10031, 95--125 (2016; Zbl 1404.94077) Full Text: DOI HAL
Canteaut, Anne; Roué, Joëlle Differential attacks against SPN: a thorough analysis. (English) Zbl 1328.94061 El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). Lecture Notes in Computer Science 9084, 45-62 (2015). MSC: 94A60 94B05 PDFBibTeX XMLCite \textit{A. Canteaut} and \textit{J. Roué}, Lect. Notes Comput. Sci. 9084, 45--62 (2015; Zbl 1328.94061) Full Text: DOI HAL
Aumasson, Jean-Philippe; Jovanovic, Philipp; Neves, Samuel Analysis of NORX: investigating differential and rotational properties. (English) Zbl 1370.94482 Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 306-324 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-P. Aumasson} et al., Lect. Notes Comput. Sci. 8895, 306--324 (2015; Zbl 1370.94482) Full Text: DOI
Lamberger, Mario; Mendel, Florian; Schläffer, Martin; Rechberger, Christian; Rijmen, Vincent The rebound attack and subspace distinguishers: application to Whirlpool. (English) Zbl 1314.94082 J. Cryptology 28, No. 2, 257-296 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Lamberger} et al., J. Cryptology 28, No. 2, 257--296 (2015; Zbl 1314.94082) Full Text: DOI Link
Bogdanov, Andrey; Mendel, Florian; Regazzoni, Francesco; Rijmen, Vincent; Tischhauser, Elmar ALE: AES-based lightweight authenticated encryption. (English) Zbl 1321.94042 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 447-466 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} et al., Lect. Notes Comput. Sci. 8424, 447--466 (2014; Zbl 1321.94042) Full Text: DOI
Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart Towards understanding the known-key security of block ciphers. (English) Zbl 1321.94033 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 348-366 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Andreeva} et al., Lect. Notes Comput. Sci. 8424, 348--366 (2014; Zbl 1321.94033) Full Text: DOI
Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong The resistance of PRESENT-80 against related-key differential attacks. (English) Zbl 1291.94079 Cryptogr. Commun. 6, No. 3, 171-187 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Emami} et al., Cryptogr. Commun. 6, No. 3, 171--187 (2014; Zbl 1291.94079) Full Text: DOI Link
Li, Ruilin; Li, Chao; Su, Jinshu; Sun, Bing Security evaluation of MISTY structure with SPN round function. (English) Zbl 1364.94553 Comput. Math. Appl. 65, No. 9, 1264-1279 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Li} et al., Comput. Math. Appl. 65, No. 9, 1264--1279 (2013; Zbl 1364.94553) Full Text: DOI
Röck, Andrea; Nyberg, Kaisa Generalization of Matsui’s Algorithm 1 to linear hull for key-alternating block ciphers. (English) Zbl 1263.94025 Des. Codes Cryptography 66, No. 1-3, 175-193 (2013). Reviewer: Adrian Atanasiu (Bucharest) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Röck} and \textit{K. Nyberg}, Des. Codes Cryptography 66, No. 1--3, 175--193 (2013; Zbl 1263.94025) Full Text: DOI
Zhang, Bin; Jin, Chenhui Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function. (English) Zbl 1270.94062 Sci. China, Inf. Sci. 55, No. 9, 2161-2170 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Zhang} and \textit{C. Jin}, Sci. China, Inf. Sci. 55, No. 9, 2161--2170 (2012; Zbl 1270.94062) Full Text: DOI Link
Schläffer, Martin Subspace distinguisher for 5/8 rounds of the ECHO-256 hash function. (English) Zbl 1293.94094 Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 369-387 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Schläffer}, Lect. Notes Comput. Sci. 6544, 369--387 (2011; Zbl 1293.94094) Full Text: DOI
Shibutani, Kyoji On the diffusion of generalized Feistel structures regarding differential and linear cryptanalysis. (English) Zbl 1293.94095 Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 211-228 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Shibutani}, Lect. Notes Comput. Sci. 6544, 211--228 (2011; Zbl 1293.94095) Full Text: DOI
Khovratovich, Dmitry; Biryukov, Alex; Nikolic, Ivica Speeding up collision search for byte-oriented hash functions. (English) Zbl 1237.94068 Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 164-181 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Khovratovich} et al., Lect. Notes Comput. Sci. 5473, 164--181 (2009; Zbl 1237.94068) Full Text: DOI Link
Piret, Gilles; Standaert, François-Xavier Provable security of block ciphers against linear cryptanalysis: a mission impossible? (English) Zbl 1237.94086 Des. Codes Cryptography 50, No. 3, 325-338 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Piret} and \textit{F.-X. Standaert}, Des. Codes Cryptography 50, No. 3, 325--338 (2009; Zbl 1237.94086) Full Text: DOI
Choy, Jiali; Khoo, Khoongming New applications of differential bounds of the SDS structure. (English) Zbl 1182.94038 Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 367-384 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Choy} and \textit{K. Khoo}, Lect. Notes Comput. Sci. 5222, 367--384 (2008; Zbl 1182.94038) Full Text: DOI
Gueron, Shay; Kounavis, Michael E. Vortex: A new family of one-way hash functions based on AES rounds and carry-less multiplication. (English) Zbl 1182.94039 Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 331-340 (2008). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Gueron} and \textit{M. E. Kounavis}, Lect. Notes Comput. Sci. 5222, 331--340 (2008; Zbl 1182.94039) Full Text: DOI
Collard, Baydoin; Standaert, François-Xavier; Quisquater, Jean-Jacques Experiments on the multiple linear cryptanalysis of reduced round Serpent. (English) Zbl 1154.94385 Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 382-397 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Collard} et al., Lect. Notes Comput. Sci. 5086, 382--397 (2008; Zbl 1154.94385) Full Text: DOI
Standaert, François-Xavier; Piret, Gilles; Gershenfeld, Neil; Quisquater, Jean-Jacques SEA: a scalable encryption algorithm for small embedded applications. (English) Zbl 1333.94048 Domingo-Ferrer, Josep (ed.) et al., Smart card research and advanced applications. 7th IFIP WG 8.8/11.2 international conference, CARDIS 2006, Tarragona, Spain, April 19–21, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-33311-1/pbk; 978-3-540-33312-8/ebook). Lecture Notes in Computer Science 3928, 222-236 (2006). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{F.-X. Standaert} et al., Lect. Notes Comput. Sci. 3928, 222--236 (2006; Zbl 1333.94048) Full Text: DOI