Liu, Jun; Wang, Dachao; Hu, Yupu; Chen, Jie; Wang, Baocang Improved key-recovery attacks on reduced-round WEM-8. (English) Zbl 1497.94105 Des. Codes Cryptography 90, No. 10, 2419-2448 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Liu} et al., Des. Codes Cryptography 90, No. 10, 2419--2448 (2022; Zbl 1497.94105) Full Text: DOI
Dunkelman, Orr; Eichlseder, Maria; Kales, Daniel; Keller, Nathan; Leurent, Gaëtan; Schofnegger, Markus Practical key recovery attacks on FlexAEAD. (English) Zbl 1485.94081 Des. Codes Cryptography 90, No. 4, 983-1007 (2022). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{O. Dunkelman} et al., Des. Codes Cryptography 90, No. 4, 983--1007 (2022; Zbl 1485.94081) Full Text: DOI
Barg, Alexander; Chen, Zitan; Tamo, Itzhak A construction of maximally recoverable codes. (English) Zbl 1508.94121 Des. Codes Cryptography 90, No. 4, 939-945 (2022). Reviewer: Zlatko Varbanov (Veliko Tarnovo) MSC: 94B60 94B05 PDFBibTeX XMLCite \textit{A. Barg} et al., Des. Codes Cryptography 90, No. 4, 939--945 (2022; Zbl 1508.94121) Full Text: DOI arXiv
Lau, Terry Shue Chien; Tan, Chik How On the design and security of Lee metric McEliece cryptosystems. (English) Zbl 1485.94105 Des. Codes Cryptography 90, No. 3, 695-717 (2022). MSC: 94A60 94B35 11T71 14G50 PDFBibTeX XMLCite \textit{T. S. C. Lau} and \textit{C. H. Tan}, Des. Codes Cryptography 90, No. 3, 695--717 (2022; Zbl 1485.94105) Full Text: DOI
Dalai, Deepak Kumar; Pal, Santu; Sarkar, Santanu A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a. (English) Zbl 1485.94077 Des. Codes Cryptography 90, No. 3, 489-521 (2022). MSC: 94A60 11T71 05C50 97H60 PDFBibTeX XMLCite \textit{D. K. Dalai} et al., Des. Codes Cryptography 90, No. 3, 489--521 (2022; Zbl 1485.94077) Full Text: DOI
Demirbaş, Fatih; Kara, Orhun Integral characteristics by keyspace partitioning. (English) Zbl 1493.94031 Des. Codes Cryptography 90, No. 2, 443-472 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Demirbaş} and \textit{O. Kara}, Des. Codes Cryptography 90, No. 2, 443--472 (2022; Zbl 1493.94031) Full Text: DOI
Song, Ling; Tu, Yi; Shi, Danping; Hu, Lei Security analysis of subterranean 2.0. (English) Zbl 1469.94113 Des. Codes Cryptography 89, No. 8, 1875-1905 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Song} et al., Des. Codes Cryptography 89, No. 8, 1875--1905 (2021; Zbl 1469.94113) Full Text: DOI
Shi, Tairong; Wu, Wenling; Hu, Bin; Guan, Jie; Wang, Sengpeng Breaking LWC candidates: sESTATE and Elephant in quantum setting. (English) Zbl 1466.94038 Des. Codes Cryptography 89, No. 7, 1405-1432 (2021). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{T. Shi} et al., Des. Codes Cryptography 89, No. 7, 1405--1432 (2021; Zbl 1466.94038) Full Text: DOI
Márquez-Corbella, Irene; Martínez-Moro, Edgar; Munuera, Carlos Computing sharp recovery structures for locally recoverable codes. (English) Zbl 1442.14091 Des. Codes Cryptography 88, No. 8, 1687-1698 (2020). Reviewer: Felipe Zaldívar (Ciudad de México) MSC: 14G50 94B05 94B15 11T71 94B27 PDFBibTeX XMLCite \textit{I. Márquez-Corbella} et al., Des. Codes Cryptography 88, No. 8, 1687--1698 (2020; Zbl 1442.14091) Full Text: DOI arXiv
López, Hiram H.; Matthews, Gretchen L.; Soprunov, Ivan Monomial-Cartesian codes and their duals, with applications to LCD codes, quantum codes, and locally recoverable codes. (English) Zbl 1454.94127 Des. Codes Cryptography 88, No. 8, 1673-1685 (2020). Reviewer: Eda Yildiz (Istanbul) MSC: 94B05 11T71 14G50 81P45 81P70 81P73 PDFBibTeX XMLCite \textit{H. H. López} et al., Des. Codes Cryptography 88, No. 8, 1673--1685 (2020; Zbl 1454.94127) Full Text: DOI arXiv
Zhao, Boxin; Dong, Xiaoyang; Meier, Willi; Jia, Keting; Wang, Gaoli Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. (English) Zbl 1448.94236 Des. Codes Cryptography 88, No. 6, 1103-1126 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Zhao} et al., Des. Codes Cryptography 88, No. 6, 1103--1126 (2020; Zbl 1448.94236) Full Text: DOI
Bi, Wenquan; Li, Zheng; Dong, Xiaoyang; Li, Lu; Wang, Xiaoyun Conditional cube attack on round-reduced River Keyak. (English) Zbl 1387.94068 Des. Codes Cryptography 86, No. 6, 1295-1310 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{W. Bi} et al., Des. Codes Cryptography 86, No. 6, 1295--1310 (2018; Zbl 1387.94068) Full Text: DOI
Paul, Goutam; Ray, Souvik On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers. (English) Zbl 1387.94096 Des. Codes Cryptography 86, No. 6, 1211-1247 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Paul} and \textit{S. Ray}, Des. Codes Cryptography 86, No. 6, 1211--1247 (2018; Zbl 1387.94096) Full Text: DOI
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu Extended meet-in-the-middle attacks on some Feistel constructions. (English) Zbl 1348.94053 Des. Codes Cryptography 80, No. 3, 587-618 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Guo} et al., Des. Codes Cryptography 80, No. 3, 587--618 (2016; Zbl 1348.94053) Full Text: DOI
Bulygin, Stanislav; Walter, Michael; Buchmann, Johannes Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures. (English) Zbl 1308.94062 Des. Codes Cryptography 73, No. 3, 997-1022 (2014). MSC: 94A60 90C10 PDFBibTeX XMLCite \textit{S. Bulygin} et al., Des. Codes Cryptography 73, No. 3, 997--1022 (2014; Zbl 1308.94062) Full Text: DOI
Couvreur, Alain; Gaborit, Philippe; Gauthier-Umaña, Valérie; Otmani, Ayoub; Tillich, Jean-Pierre Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. (English) Zbl 1310.94138 Des. Codes Cryptography 73, No. 2, 641-666 (2014). MSC: 94A60 94B27 PDFBibTeX XMLCite \textit{A. Couvreur} et al., Des. Codes Cryptography 73, No. 2, 641--666 (2014; Zbl 1310.94138) Full Text: DOI arXiv
Röck, Andrea; Nyberg, Kaisa Generalization of Matsui’s Algorithm 1 to linear hull for key-alternating block ciphers. (English) Zbl 1263.94025 Des. Codes Cryptography 66, No. 1-3, 175-193 (2013). Reviewer: Adrian Atanasiu (Bucharest) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Röck} and \textit{K. Nyberg}, Des. Codes Cryptography 66, No. 1--3, 175--193 (2013; Zbl 1263.94025) Full Text: DOI
Nyberg, Kaisa; Rueppel, Rainer A. Message recovery for signature schemes based on the discrete logarithm problem. (English) Zbl 0852.94017 Des. Codes Cryptography 7, No. 1-2, 61-81 (1996). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Nyberg} and \textit{R. A. Rueppel}, Des. Codes Cryptography 7, No. 1--2, 61--81 (1996; Zbl 0852.94017) Full Text: DOI